aboutsummaryrefslogtreecommitdiffstats
path: root/security/vuxml
diff options
context:
space:
mode:
authorsunpoet <sunpoet@FreeBSD.org>2015-01-10 02:51:32 +0800
committersunpoet <sunpoet@FreeBSD.org>2015-01-10 02:51:32 +0800
commit36f1c2b6b6796d93025989074bcefd6e733a935c (patch)
tree710569aef27f458d52b5047956030202acbd95bd /security/vuxml
parenta27150aad3cf1a68bd50f35b0c2f3bfef0ddbd73 (diff)
downloadfreebsd-ports-gnome-36f1c2b6b6796d93025989074bcefd6e733a935c.tar.gz
freebsd-ports-gnome-36f1c2b6b6796d93025989074bcefd6e733a935c.tar.zst
freebsd-ports-gnome-36f1c2b6b6796d93025989074bcefd6e733a935c.zip
- Fix typo
Diffstat (limited to 'security/vuxml')
-rw-r--r--security/vuxml/vuln.xml32
1 files changed, 16 insertions, 16 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index 677f578b8a76..01dffb945e90 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -95,7 +95,7 @@ Notes:
</vuln>
<vuln vid="e9ccdb28-9802-11e4-9d9c-bcaec565249c">
- <topic>WebKit-gtk -- Multiple vulnabilities</topic>
+ <topic>WebKit-gtk -- Multiple vulnerabilities</topic>
<affects>
<package>
<name>webkit-gtk2</name>
@@ -2637,7 +2637,7 @@ Notes:
</vuln>
<vuln vid="38242d51-3e58-11e4-ac2f-bcaec565249c">
- <topic>dbus -- multiple vulnabilities</topic>
+ <topic>dbus -- multiple vulnerabilities</topic>
<affects>
<package>
<name>dbus</name>
@@ -4013,7 +4013,7 @@ Notes:
</vuln>
<vuln vid="e6a7636a-02d0-11e4-88b6-080027671656">
- <topic>dbus -- multiple vulnabilities</topic>
+ <topic>dbus -- multiple vulnerabilities</topic>
<affects>
<package>
<name>dbus</name>
@@ -4697,7 +4697,7 @@ Notes:
</vuln>
<vuln vid="02db20d7-e34a-11e3-bd92-bcaec565249c">
- <topic>openjpeg -- Multiple vulnabilities</topic>
+ <topic>openjpeg -- Multiple vulnerabilities</topic>
<affects>
<package>
<name>openjpeg</name>
@@ -6278,7 +6278,7 @@ Notes:
<body xmlns="http://www.w3.org/1999/xhtml">
<p>Google Chrome Releases reports:</p>
<blockquote cite="http://googlechromereleases.blogspot.nl/">
- <p>New vulnerabilites after the Pwn2Own competition:</p>
+ <p>New vulnerabilities after the Pwn2Own competition:</p>
<ul>
<li>[352369] Code execution outside sandbox. Credit to VUPEN.
<ul>
@@ -20413,7 +20413,7 @@ executed in your Internet Explorer while displaying the email.</p>
</vuln>
<vuln vid="6dd5e45c-f084-11e1-8d0f-406186f3d89d">
- <topic>coppermine -- Multiple vulnerabilites</topic>
+ <topic>coppermine -- Multiple vulnerabilities</topic>
<affects>
<package>
<name>coppermine</name>
@@ -28732,7 +28732,7 @@ executed in your Internet Explorer while displaying the email.</p>
</vuln>
<vuln vid="f08e2c15-ffc9-11e0-b0f3-bcaec565249c">
- <topic>cacti -- Multiple vulnabilites</topic>
+ <topic>cacti -- Multiple vulnerabilities</topic>
<affects>
<package>
<name>cacti</name>
@@ -33798,7 +33798,7 @@ executed in your Internet Explorer while displaying the email.</p>
</vuln>
<vuln vid="06a12e26-142e-11e0-bea2-0015f2db7bde">
- <topic>webkit-gtk2 -- Multiple vulnabilities</topic>
+ <topic>webkit-gtk2 -- Multiple vulnerabilities</topic>
<affects>
<package>
<name>webkit-gtk2</name>
@@ -36742,7 +36742,7 @@ executed in your Internet Explorer while displaying the email.</p>
</vuln>
<vuln vid="9bcfd7b6-bcda-11df-9a6a-0015f2db7bde">
- <topic>webkit-gtk2 -- Multiple vulnabilities</topic>
+ <topic>webkit-gtk2 -- Multiple vulnerabilities</topic>
<affects>
<package>
<name>webkit-gtk2</name>
@@ -37706,7 +37706,7 @@ executed in your Internet Explorer while displaying the email.</p>
</vuln>
<vuln vid="19419b3b-92bd-11df-b140-0015f2db7bde">
- <topic>webkit-gtk2 -- Multiple vulnabilities</topic>
+ <topic>webkit-gtk2 -- Multiple vulnerabilities</topic>
<affects>
<package>
<name>webkit-gtk2</name>
@@ -45602,7 +45602,7 @@ executed in your Internet Explorer while displaying the email.</p>
</vuln>
<vuln vid="78f5606b-f9d1-11dd-b79c-0030843d3802">
- <topic>tor -- multiple vulnerabilites</topic>
+ <topic>tor -- multiple vulnerabilities</topic>
<affects>
<package>
<name>tor</name>
@@ -50758,7 +50758,7 @@ executed in your Internet Explorer while displaying the email.</p>
</vuln>
<vuln vid="35e54755-54e4-11dd-ad8b-0030843d3802">
- <topic>phpmyadmin -- cross site request forgery vulnerabilites</topic>
+ <topic>phpmyadmin -- cross site request forgery vulnerabilities</topic>
<affects>
<package>
<name>phpMyAdmin</name>
@@ -55761,7 +55761,7 @@ executed in your Internet Explorer while displaying the email.</p>
</vuln>
<vuln vid="a5f667db-7596-11dc-8b7a-0019b944b34e">
- <topic>xfs -- multiple vulnerabilites</topic>
+ <topic>xfs -- multiple vulnerabilities</topic>
<affects>
<package>
<name>xfs</name>
@@ -73924,7 +73924,7 @@ executed in your Internet Explorer while displaying the email.</p>
<blockquote cite="http://www.gentoo.org/security/en/glsa/glsa-200506-04.xml">
<p>Due to a lack of input validation, WordPress is
vulnerable to SQL injection and XSS attacks.</p>
- <p>An attacker could use the SQL injection vulnerabilites to
+ <p>An attacker could use the SQL injection vulnerabilities to
gain information from the database. Furthermore the
cross-site scripting issues give an attacker the ability
to inject and execute malicious script code or to steal
@@ -75485,7 +75485,7 @@ executed in your Internet Explorer while displaying the email.</p>
</affects>
<description>
<body xmlns="http://www.w3.org/1999/xhtml">
- <p>Erik Sjölund discovered a vulnerabilitiy in Sympa. The
+ <p>Erik Sjölund discovered a vulnerability in Sympa. The
<code>queue</code> application processes messages received via
aliases. It contains a buffer overflow in the usage of
<code>sprintf</code>. In some configurations, it may allow an
@@ -78114,7 +78114,7 @@ executed in your Internet Explorer while displaying the email.</p>
</affects>
<description>
<body xmlns="http://www.w3.org/1999/xhtml">
- <p>Two separate SQL injection vulnerabilites have been
+ <p>Two separate SQL injection vulnerabilities have been
identified in the PostNuke PHP content management
system. An attacker can use this vulnerability to
potentially insert executable PHP code into the content