all: fix misspellings

Change-Id: Id9b0c6295a7cf1b170c383a4b9b0690dafe682b0
Reviewed-on: https://go-review.googlesource.com/c/exp/+/375055
Trust: Julie Qiu <julie@golang.org>
Run-TryBot: Julie Qiu <julie@golang.org>
TryBot-Result: Gopher Robot <gobot@golang.org>
Reviewed-by: Ian Lance Taylor <iant@golang.org>
Reviewed-by: Zvonimir Pavlinovic <zpavlinovic@google.com>
diff --git a/vulncheck/source.go b/vulncheck/source.go
index c195006..ad164af 100644
--- a/vulncheck/source.go
+++ b/vulncheck/source.go
@@ -299,7 +299,7 @@
 
 	var funNode *FuncNode
 	// If there are vulnerabilities for f, create node for f and
-	// save it immediatelly. This allows us to include F in the
+	// save it immediately. This allows us to include F in the
 	// slice when analyzing chain V -> F -> V where V is vulnerable.
 	if len(vulns) > 0 {
 		funNode = funcNode(f)
diff --git a/vulncheck/vulncheck.go b/vulncheck/vulncheck.go
index 8561a6e..0adf96f 100644
--- a/vulncheck/vulncheck.go
+++ b/vulncheck/vulncheck.go
@@ -350,7 +350,7 @@
 	return packageVulns
 }
 
-// VulnsForSymbol returns vulnerabilites for `symbol` in `mv.VulnsForPackage(importPath)`.
+// VulnsForSymbol returns vulnerabilities for `symbol` in `mv.VulnsForPackage(importPath)`.
 func (mv moduleVulnerabilities) VulnsForSymbol(importPath, symbol string) []*osv.Entry {
 	vulns := mv.VulnsForPackage(importPath)
 	if vulns == nil {