summaryrefslogtreecommitdiff
path: root/security
diff options
context:
space:
mode:
authordillo <dillo>2005-06-12 13:57:24 +0000
committerdillo <dillo>2005-06-12 13:57:24 +0000
commitc3005703ef6501d6e324a9851d7464d8eb5e281c (patch)
tree2252431b1c80498e0c2f660209ab4e8c07a2d679 /security
parent9e6572c9e7b17bead429009f9d12f206c1725465 (diff)
downloadpkgsrc-c3005703ef6501d6e324a9851d7464d8eb5e281c.tar.gz
replace centered dots with `o', as they are not always displayed correctly
noted by adrianp
Diffstat (limited to 'security')
-rw-r--r--security/audit-packages/files/audit-packages.068
1 files changed, 34 insertions, 34 deletions
diff --git a/security/audit-packages/files/audit-packages.0 b/security/audit-packages/files/audit-packages.0
index 636bf860af7..64e00c78202 100644
--- a/security/audit-packages/files/audit-packages.0
+++ b/security/audit-packages/files/audit-packages.0
@@ -25,40 +25,40 @@ DDEESSCCRRIIPPTTIIOONN
Each line lists the package and vulnerable versions, the type of exploit,
and an Internet address for further information. The type of exploit can
be any text, although some common types of exploits listed are:
- ·· cross-site-html
- ·· cross-site-scripting
- ·· denial-of-service
- ·· file-permissions
- ·· local-access
- ·· local-code-execution
- ·· local-file-read
- ·· local-file-removal
- ·· local-file-write
- ·· local-root-file-view
- ·· local-root-shell
- ·· local-symlink-race
- ·· local-user-file-view
- ·· local-user-shell
- ·· privacy-leak
- ·· remote-code-execution
- ·· remote-command-inject
- ·· remote-file-creation
- ·· remote-file-read
- ·· remote-file-view
- ·· remote-file-write
- ·· remote-key-theft
- ·· remote-root-access
- ·· remote-root-shell
- ·· remote-script-inject
- ·· remote-server-admin
- ·· remote-use-of-secret
- ·· remote-user-access
- ·· remote-user-file-view
- ·· remote-user-shell
- ·· unknown
- ·· weak-authentication
- ·· weak-encryption
- ·· weak-ssl-authentication
+ oo cross-site-html
+ oo cross-site-scripting
+ oo denial-of-service
+ oo file-permissions
+ oo local-access
+ oo local-code-execution
+ oo local-file-read
+ oo local-file-removal
+ oo local-file-write
+ oo local-root-file-view
+ oo local-root-shell
+ oo local-symlink-race
+ oo local-user-file-view
+ oo local-user-shell
+ oo privacy-leak
+ oo remote-code-execution
+ oo remote-command-inject
+ oo remote-file-creation
+ oo remote-file-read
+ oo remote-file-view
+ oo remote-file-write
+ oo remote-key-theft
+ oo remote-root-access
+ oo remote-root-shell
+ oo remote-script-inject
+ oo remote-server-admin
+ oo remote-use-of-secret
+ oo remote-user-access
+ oo remote-user-file-view
+ oo remote-user-shell
+ oo unknown
+ oo weak-authentication
+ oo weak-encryption
+ oo weak-ssl-authentication
By default, the vulnerabilities file is stored in the @PKGVULNDIR@ direc-
tory. This can be changed by defining the environment variable