svn commit: r376643 - head/security/vuxml
Sunpoet Po-Chuan Hsieh
sunpoet at FreeBSD.org
Fri Jan 9 18:51:34 UTC 2015
Author: sunpoet
Date: Fri Jan 9 18:51:32 2015
New Revision: 376643
URL: https://svnweb.freebsd.org/changeset/ports/376643
QAT: https://qat.redports.org/buildarchive/r376643/
Log:
- Fix typo
Modified:
head/security/vuxml/vuln.xml
Modified: head/security/vuxml/vuln.xml
==============================================================================
--- head/security/vuxml/vuln.xml Fri Jan 9 18:47:03 2015 (r376642)
+++ head/security/vuxml/vuln.xml Fri Jan 9 18:51:32 2015 (r376643)
@@ -95,7 +95,7 @@ Notes:
</vuln>
<vuln vid="e9ccdb28-9802-11e4-9d9c-bcaec565249c">
- <topic>WebKit-gtk -- Multiple vulnabilities</topic>
+ <topic>WebKit-gtk -- Multiple vulnerabilities</topic>
<affects>
<package>
<name>webkit-gtk2</name>
@@ -2637,7 +2637,7 @@ Notes:
</vuln>
<vuln vid="38242d51-3e58-11e4-ac2f-bcaec565249c">
- <topic>dbus -- multiple vulnabilities</topic>
+ <topic>dbus -- multiple vulnerabilities</topic>
<affects>
<package>
<name>dbus</name>
@@ -4013,7 +4013,7 @@ Notes:
</vuln>
<vuln vid="e6a7636a-02d0-11e4-88b6-080027671656">
- <topic>dbus -- multiple vulnabilities</topic>
+ <topic>dbus -- multiple vulnerabilities</topic>
<affects>
<package>
<name>dbus</name>
@@ -4697,7 +4697,7 @@ Notes:
</vuln>
<vuln vid="02db20d7-e34a-11e3-bd92-bcaec565249c">
- <topic>openjpeg -- Multiple vulnabilities</topic>
+ <topic>openjpeg -- Multiple vulnerabilities</topic>
<affects>
<package>
<name>openjpeg</name>
@@ -6278,7 +6278,7 @@ Notes:
<body xmlns="http://www.w3.org/1999/xhtml">
<p>Google Chrome Releases reports:</p>
<blockquote cite="http://googlechromereleases.blogspot.nl/">
- <p>New vulnerabilites after the Pwn2Own competition:</p>
+ <p>New vulnerabilities after the Pwn2Own competition:</p>
<ul>
<li>[352369] Code execution outside sandbox. Credit to VUPEN.
<ul>
@@ -20413,7 +20413,7 @@ executed in your Internet Explorer while
</vuln>
<vuln vid="6dd5e45c-f084-11e1-8d0f-406186f3d89d">
- <topic>coppermine -- Multiple vulnerabilites</topic>
+ <topic>coppermine -- Multiple vulnerabilities</topic>
<affects>
<package>
<name>coppermine</name>
@@ -28732,7 +28732,7 @@ executed in your Internet Explorer while
</vuln>
<vuln vid="f08e2c15-ffc9-11e0-b0f3-bcaec565249c">
- <topic>cacti -- Multiple vulnabilites</topic>
+ <topic>cacti -- Multiple vulnerabilities</topic>
<affects>
<package>
<name>cacti</name>
@@ -33798,7 +33798,7 @@ executed in your Internet Explorer while
</vuln>
<vuln vid="06a12e26-142e-11e0-bea2-0015f2db7bde">
- <topic>webkit-gtk2 -- Multiple vulnabilities</topic>
+ <topic>webkit-gtk2 -- Multiple vulnerabilities</topic>
<affects>
<package>
<name>webkit-gtk2</name>
@@ -36742,7 +36742,7 @@ executed in your Internet Explorer while
</vuln>
<vuln vid="9bcfd7b6-bcda-11df-9a6a-0015f2db7bde">
- <topic>webkit-gtk2 -- Multiple vulnabilities</topic>
+ <topic>webkit-gtk2 -- Multiple vulnerabilities</topic>
<affects>
<package>
<name>webkit-gtk2</name>
@@ -37706,7 +37706,7 @@ executed in your Internet Explorer while
</vuln>
<vuln vid="19419b3b-92bd-11df-b140-0015f2db7bde">
- <topic>webkit-gtk2 -- Multiple vulnabilities</topic>
+ <topic>webkit-gtk2 -- Multiple vulnerabilities</topic>
<affects>
<package>
<name>webkit-gtk2</name>
@@ -45602,7 +45602,7 @@ executed in your Internet Explorer while
</vuln>
<vuln vid="78f5606b-f9d1-11dd-b79c-0030843d3802">
- <topic>tor -- multiple vulnerabilites</topic>
+ <topic>tor -- multiple vulnerabilities</topic>
<affects>
<package>
<name>tor</name>
@@ -50758,7 +50758,7 @@ executed in your Internet Explorer while
</vuln>
<vuln vid="35e54755-54e4-11dd-ad8b-0030843d3802">
- <topic>phpmyadmin -- cross site request forgery vulnerabilites</topic>
+ <topic>phpmyadmin -- cross site request forgery vulnerabilities</topic>
<affects>
<package>
<name>phpMyAdmin</name>
@@ -55761,7 +55761,7 @@ executed in your Internet Explorer while
</vuln>
<vuln vid="a5f667db-7596-11dc-8b7a-0019b944b34e">
- <topic>xfs -- multiple vulnerabilites</topic>
+ <topic>xfs -- multiple vulnerabilities</topic>
<affects>
<package>
<name>xfs</name>
@@ -73924,7 +73924,7 @@ executed in your Internet Explorer while
<blockquote cite="http://www.gentoo.org/security/en/glsa/glsa-200506-04.xml">
<p>Due to a lack of input validation, WordPress is
vulnerable to SQL injection and XSS attacks.</p>
- <p>An attacker could use the SQL injection vulnerabilites to
+ <p>An attacker could use the SQL injection vulnerabilities to
gain information from the database. Furthermore the
cross-site scripting issues give an attacker the ability
to inject and execute malicious script code or to steal
@@ -75485,7 +75485,7 @@ executed in your Internet Explorer while
</affects>
<description>
<body xmlns="http://www.w3.org/1999/xhtml">
- <p>Erik Sjölund discovered a vulnerabilitiy in Sympa. The
+ <p>Erik Sjölund discovered a vulnerability in Sympa. The
<code>queue</code> application processes messages received via
aliases. It contains a buffer overflow in the usage of
<code>sprintf</code>. In some configurations, it may allow an
@@ -78114,7 +78114,7 @@ executed in your Internet Explorer while
</affects>
<description>
<body xmlns="http://www.w3.org/1999/xhtml">
- <p>Two separate SQL injection vulnerabilites have been
+ <p>Two separate SQL injection vulnerabilities have been
identified in the PostNuke PHP content management
system. An attacker can use this vulnerability to
potentially insert executable PHP code into the content
More information about the svn-ports-head
mailing list