summaryrefslogtreecommitdiff
path: root/security/audit-packages
diff options
context:
space:
mode:
authordillo <dillo@pkgsrc.org>2005-06-12 13:57:24 +0000
committerdillo <dillo@pkgsrc.org>2005-06-12 13:57:24 +0000
commit79aa84b5f74003e8206c405cc2145c03e5da1bcd (patch)
tree2252431b1c80498e0c2f660209ab4e8c07a2d679 /security/audit-packages
parent9152de394646f79149773ec7a99c6e069a0fbcde (diff)
downloadpkgsrc-79aa84b5f74003e8206c405cc2145c03e5da1bcd.tar.gz
replace centered dots with `o', as they are not always displayed correctly
noted by adrianp
Diffstat (limited to 'security/audit-packages')
-rw-r--r--security/audit-packages/files/audit-packages.068
1 files changed, 34 insertions, 34 deletions
diff --git a/security/audit-packages/files/audit-packages.0 b/security/audit-packages/files/audit-packages.0
index 636bf860af7..64e00c78202 100644
--- a/security/audit-packages/files/audit-packages.0
+++ b/security/audit-packages/files/audit-packages.0
@@ -25,40 +25,40 @@ DDEESSCCRRIIPPTTIIOONN
Each line lists the package and vulnerable versions, the type of exploit,
and an Internet address for further information. The type of exploit can
be any text, although some common types of exploits listed are:
- ·· cross-site-html
- ·· cross-site-scripting
- ·· denial-of-service
- ·· file-permissions
- ·· local-access
- ·· local-code-execution
- ·· local-file-read
- ·· local-file-removal
- ·· local-file-write
- ·· local-root-file-view
- ·· local-root-shell
- ·· local-symlink-race
- ·· local-user-file-view
- ·· local-user-shell
- ·· privacy-leak
- ·· remote-code-execution
- ·· remote-command-inject
- ·· remote-file-creation
- ·· remote-file-read
- ·· remote-file-view
- ·· remote-file-write
- ·· remote-key-theft
- ·· remote-root-access
- ·· remote-root-shell
- ·· remote-script-inject
- ·· remote-server-admin
- ·· remote-use-of-secret
- ·· remote-user-access
- ·· remote-user-file-view
- ·· remote-user-shell
- ·· unknown
- ·· weak-authentication
- ·· weak-encryption
- ·· weak-ssl-authentication
+ oo cross-site-html
+ oo cross-site-scripting
+ oo denial-of-service
+ oo file-permissions
+ oo local-access
+ oo local-code-execution
+ oo local-file-read
+ oo local-file-removal
+ oo local-file-write
+ oo local-root-file-view
+ oo local-root-shell
+ oo local-symlink-race
+ oo local-user-file-view
+ oo local-user-shell
+ oo privacy-leak
+ oo remote-code-execution
+ oo remote-command-inject
+ oo remote-file-creation
+ oo remote-file-read
+ oo remote-file-view
+ oo remote-file-write
+ oo remote-key-theft
+ oo remote-root-access
+ oo remote-root-shell
+ oo remote-script-inject
+ oo remote-server-admin
+ oo remote-use-of-secret
+ oo remote-user-access
+ oo remote-user-file-view
+ oo remote-user-shell
+ oo unknown
+ oo weak-authentication
+ oo weak-encryption
+ oo weak-ssl-authentication
By default, the vulnerabilities file is stored in the @PKGVULNDIR@ direc-
tory. This can be changed by defining the environment variable