summaryrefslogtreecommitdiffstats
path: root/docs/xml
diff options
context:
space:
mode:
authorjocuri%softhome.net <>2006-03-01 20:30:14 +0100
committerjocuri%softhome.net <>2006-03-01 20:30:14 +0100
commitb48bb30b5531dc67d199b5f773fa54a77016dc38 (patch)
tree0cfb92132bc28f3aa3718e562e6e1cec829ce200 /docs/xml
parent1a18ed133c015a3f85b1b4b3413333d3f85f342c (diff)
downloadbugzilla-b48bb30b5531dc67d199b5f773fa54a77016dc38.tar.gz
bugzilla-b48bb30b5531dc67d199b5f773fa54a77016dc38.tar.xz
Documentation patch: fix 'vunerabilites'->'vulnerabilities' spelling.
Diffstat (limited to 'docs/xml')
-rw-r--r--docs/xml/security.xml4
1 files changed, 2 insertions, 2 deletions
diff --git a/docs/xml/security.xml b/docs/xml/security.xml
index 0d52df683..49795ce05 100644
--- a/docs/xml/security.xml
+++ b/docs/xml/security.xml
@@ -1,5 +1,5 @@
<!-- <!DOCTYPE chapter PUBLIC "-//OASIS//DTD DocBook XML V4.1.2//EN"> -->
-<!-- $Id: security.xml,v 1.11 2006/02/24 01:29:38 jocuri%softhome.net Exp $ -->
+<!-- $Id: security.xml,v 1.12 2006/03/01 11:30:14 jocuri%softhome.net Exp $ -->
<chapter id="security">
<title>Bugzilla Security</title>
@@ -141,7 +141,7 @@
have no other reason to access MySQL remotely, then you should disable
the network access. This, along with the suggestion in
<xref linkend="security-os-ports"/>, will help protect your system from
- any remote vulnerabilites in MySQL.
+ any remote vulnerabilities in MySQL.
</para>
<example id="security-mysql-network-ex">