Date: Fri, 9 Jan 2015 18:51:33 +0000 (UTC) From: Sunpoet Po-Chuan Hsieh <sunpoet@FreeBSD.org> To: ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org Subject: svn commit: r376643 - head/security/vuxml Message-ID: <201501091851.t09IpXE0019817@svn.freebsd.org>
next in thread | raw e-mail | index | archive | help
Author: sunpoet Date: Fri Jan 9 18:51:32 2015 New Revision: 376643 URL: https://svnweb.freebsd.org/changeset/ports/376643 QAT: https://qat.redports.org/buildarchive/r376643/ Log: - Fix typo Modified: head/security/vuxml/vuln.xml Modified: head/security/vuxml/vuln.xml ============================================================================== --- head/security/vuxml/vuln.xml Fri Jan 9 18:47:03 2015 (r376642) +++ head/security/vuxml/vuln.xml Fri Jan 9 18:51:32 2015 (r376643) @@ -95,7 +95,7 @@ Notes: </vuln> <vuln vid="e9ccdb28-9802-11e4-9d9c-bcaec565249c"> - <topic>WebKit-gtk -- Multiple vulnabilities</topic> + <topic>WebKit-gtk -- Multiple vulnerabilities</topic> <affects> <package> <name>webkit-gtk2</name> @@ -2637,7 +2637,7 @@ Notes: </vuln> <vuln vid="38242d51-3e58-11e4-ac2f-bcaec565249c"> - <topic>dbus -- multiple vulnabilities</topic> + <topic>dbus -- multiple vulnerabilities</topic> <affects> <package> <name>dbus</name> @@ -4013,7 +4013,7 @@ Notes: </vuln> <vuln vid="e6a7636a-02d0-11e4-88b6-080027671656"> - <topic>dbus -- multiple vulnabilities</topic> + <topic>dbus -- multiple vulnerabilities</topic> <affects> <package> <name>dbus</name> @@ -4697,7 +4697,7 @@ Notes: </vuln> <vuln vid="02db20d7-e34a-11e3-bd92-bcaec565249c"> - <topic>openjpeg -- Multiple vulnabilities</topic> + <topic>openjpeg -- Multiple vulnerabilities</topic> <affects> <package> <name>openjpeg</name> @@ -6278,7 +6278,7 @@ Notes: <body xmlns="http://www.w3.org/1999/xhtml"> <p>Google Chrome Releases reports:</p> <blockquote cite="http://googlechromereleases.blogspot.nl/"> - <p>New vulnerabilites after the Pwn2Own competition:</p> + <p>New vulnerabilities after the Pwn2Own competition:</p> <ul> <li>[352369] Code execution outside sandbox. Credit to VUPEN. <ul> @@ -20413,7 +20413,7 @@ executed in your Internet Explorer while </vuln> <vuln vid="6dd5e45c-f084-11e1-8d0f-406186f3d89d"> - <topic>coppermine -- Multiple vulnerabilites</topic> + <topic>coppermine -- Multiple vulnerabilities</topic> <affects> <package> <name>coppermine</name> @@ -28732,7 +28732,7 @@ executed in your Internet Explorer while </vuln> <vuln vid="f08e2c15-ffc9-11e0-b0f3-bcaec565249c"> - <topic>cacti -- Multiple vulnabilites</topic> + <topic>cacti -- Multiple vulnerabilities</topic> <affects> <package> <name>cacti</name> @@ -33798,7 +33798,7 @@ executed in your Internet Explorer while </vuln> <vuln vid="06a12e26-142e-11e0-bea2-0015f2db7bde"> - <topic>webkit-gtk2 -- Multiple vulnabilities</topic> + <topic>webkit-gtk2 -- Multiple vulnerabilities</topic> <affects> <package> <name>webkit-gtk2</name> @@ -36742,7 +36742,7 @@ executed in your Internet Explorer while </vuln> <vuln vid="9bcfd7b6-bcda-11df-9a6a-0015f2db7bde"> - <topic>webkit-gtk2 -- Multiple vulnabilities</topic> + <topic>webkit-gtk2 -- Multiple vulnerabilities</topic> <affects> <package> <name>webkit-gtk2</name> @@ -37706,7 +37706,7 @@ executed in your Internet Explorer while </vuln> <vuln vid="19419b3b-92bd-11df-b140-0015f2db7bde"> - <topic>webkit-gtk2 -- Multiple vulnabilities</topic> + <topic>webkit-gtk2 -- Multiple vulnerabilities</topic> <affects> <package> <name>webkit-gtk2</name> @@ -45602,7 +45602,7 @@ executed in your Internet Explorer while </vuln> <vuln vid="78f5606b-f9d1-11dd-b79c-0030843d3802"> - <topic>tor -- multiple vulnerabilites</topic> + <topic>tor -- multiple vulnerabilities</topic> <affects> <package> <name>tor</name> @@ -50758,7 +50758,7 @@ executed in your Internet Explorer while </vuln> <vuln vid="35e54755-54e4-11dd-ad8b-0030843d3802"> - <topic>phpmyadmin -- cross site request forgery vulnerabilites</topic> + <topic>phpmyadmin -- cross site request forgery vulnerabilities</topic> <affects> <package> <name>phpMyAdmin</name> @@ -55761,7 +55761,7 @@ executed in your Internet Explorer while </vuln> <vuln vid="a5f667db-7596-11dc-8b7a-0019b944b34e"> - <topic>xfs -- multiple vulnerabilites</topic> + <topic>xfs -- multiple vulnerabilities</topic> <affects> <package> <name>xfs</name> @@ -73924,7 +73924,7 @@ executed in your Internet Explorer while <blockquote cite="http://www.gentoo.org/security/en/glsa/glsa-200506-04.xml"> <p>Due to a lack of input validation, WordPress is vulnerable to SQL injection and XSS attacks.</p> - <p>An attacker could use the SQL injection vulnerabilites to + <p>An attacker could use the SQL injection vulnerabilities to gain information from the database. Furthermore the cross-site scripting issues give an attacker the ability to inject and execute malicious script code or to steal @@ -75485,7 +75485,7 @@ executed in your Internet Explorer while </affects> <description> <body xmlns="http://www.w3.org/1999/xhtml"> - <p>Erik Sjölund discovered a vulnerabilitiy in Sympa. The + <p>Erik Sjölund discovered a vulnerability in Sympa. The <code>queue</code> application processes messages received via aliases. It contains a buffer overflow in the usage of <code>sprintf</code>. In some configurations, it may allow an @@ -78114,7 +78114,7 @@ executed in your Internet Explorer while </affects> <description> <body xmlns="http://www.w3.org/1999/xhtml"> - <p>Two separate SQL injection vulnerabilites have been + <p>Two separate SQL injection vulnerabilities have been identified in the PostNuke PHP content management system. An attacker can use this vulnerability to potentially insert executable PHP code into the content
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201501091851.t09IpXE0019817>