diff options
author | dillo <dillo@pkgsrc.org> | 2005-06-12 13:57:24 +0000 |
---|---|---|
committer | dillo <dillo@pkgsrc.org> | 2005-06-12 13:57:24 +0000 |
commit | 79aa84b5f74003e8206c405cc2145c03e5da1bcd (patch) | |
tree | 2252431b1c80498e0c2f660209ab4e8c07a2d679 /security/audit-packages | |
parent | 9152de394646f79149773ec7a99c6e069a0fbcde (diff) | |
download | pkgsrc-79aa84b5f74003e8206c405cc2145c03e5da1bcd.tar.gz |
replace centered dots with `o', as they are not always displayed correctly
noted by adrianp
Diffstat (limited to 'security/audit-packages')
-rw-r--r-- | security/audit-packages/files/audit-packages.0 | 68 |
1 files changed, 34 insertions, 34 deletions
diff --git a/security/audit-packages/files/audit-packages.0 b/security/audit-packages/files/audit-packages.0 index 636bf860af7..64e00c78202 100644 --- a/security/audit-packages/files/audit-packages.0 +++ b/security/audit-packages/files/audit-packages.0 @@ -25,40 +25,40 @@ DDEESSCCRRIIPPTTIIOONN Each line lists the package and vulnerable versions, the type of exploit, and an Internet address for further information. The type of exploit can be any text, although some common types of exploits listed are: - ·· cross-site-html - ·· cross-site-scripting - ·· denial-of-service - ·· file-permissions - ·· local-access - ·· local-code-execution - ·· local-file-read - ·· local-file-removal - ·· local-file-write - ·· local-root-file-view - ·· local-root-shell - ·· local-symlink-race - ·· local-user-file-view - ·· local-user-shell - ·· privacy-leak - ·· remote-code-execution - ·· remote-command-inject - ·· remote-file-creation - ·· remote-file-read - ·· remote-file-view - ·· remote-file-write - ·· remote-key-theft - ·· remote-root-access - ·· remote-root-shell - ·· remote-script-inject - ·· remote-server-admin - ·· remote-use-of-secret - ·· remote-user-access - ·· remote-user-file-view - ·· remote-user-shell - ·· unknown - ·· weak-authentication - ·· weak-encryption - ·· weak-ssl-authentication + oo cross-site-html + oo cross-site-scripting + oo denial-of-service + oo file-permissions + oo local-access + oo local-code-execution + oo local-file-read + oo local-file-removal + oo local-file-write + oo local-root-file-view + oo local-root-shell + oo local-symlink-race + oo local-user-file-view + oo local-user-shell + oo privacy-leak + oo remote-code-execution + oo remote-command-inject + oo remote-file-creation + oo remote-file-read + oo remote-file-view + oo remote-file-write + oo remote-key-theft + oo remote-root-access + oo remote-root-shell + oo remote-script-inject + oo remote-server-admin + oo remote-use-of-secret + oo remote-user-access + oo remote-user-file-view + oo remote-user-shell + oo unknown + oo weak-authentication + oo weak-encryption + oo weak-ssl-authentication By default, the vulnerabilities file is stored in the @PKGVULNDIR@ direc- tory. This can be changed by defining the environment variable |