pkgsrc-Changes-HG archive

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]

[pkgsrc/trunk]: pkgsrc/security/audit-packages/files replace centered dots wi...



details:   https://anonhg.NetBSD.org/pkgsrc/rev/4f01d9e6e78d
branches:  trunk
changeset: 495524:4f01d9e6e78d
user:      dillo <dillo%pkgsrc.org@localhost>
date:      Sun Jun 12 13:57:24 2005 +0000

description:
replace centered dots with `o', as they are not always displayed correctly
noted by adrianp

diffstat:

 security/audit-packages/files/audit-packages.0 |  68 +++++++++++++-------------
 1 files changed, 34 insertions(+), 34 deletions(-)

diffs (78 lines):

diff -r 316bac4d1e5f -r 4f01d9e6e78d security/audit-packages/files/audit-packages.0
--- a/security/audit-packages/files/audit-packages.0    Sun Jun 12 13:44:26 2005 +0000
+++ b/security/audit-packages/files/audit-packages.0    Sun Jun 12 13:57:24 2005 +0000
@@ -25,40 +25,40 @@
      Each line lists the package and vulnerable versions, the type of exploit,
      and an Internet address for further information.  The type of exploit can
      be any text, although some common types of exploits listed are:
-           ··   cross-site-html
-           ··   cross-site-scripting
-           ··   denial-of-service
-           ··   file-permissions
-           ··   local-access
-           ··   local-code-execution
-           ··   local-file-read
-           ··   local-file-removal
-           ··   local-file-write
-           ··   local-root-file-view
-           ··   local-root-shell
-           ··   local-symlink-race
-           ··   local-user-file-view
-           ··   local-user-shell
-           ··   privacy-leak
-           ··   remote-code-execution
-           ··   remote-command-inject
-           ··   remote-file-creation
-           ··   remote-file-read
-           ··   remote-file-view
-           ··   remote-file-write
-           ··   remote-key-theft
-           ··   remote-root-access
-           ··   remote-root-shell
-           ··   remote-script-inject
-           ··   remote-server-admin
-           ··   remote-use-of-secret
-           ··   remote-user-access
-           ··   remote-user-file-view
-           ··   remote-user-shell
-           ··   unknown
-           ··   weak-authentication
-           ··   weak-encryption
-           ··   weak-ssl-authentication
+           oo   cross-site-html
+           oo   cross-site-scripting
+           oo   denial-of-service
+           oo   file-permissions
+           oo   local-access
+           oo   local-code-execution
+           oo   local-file-read
+           oo   local-file-removal
+           oo   local-file-write
+           oo   local-root-file-view
+           oo   local-root-shell
+           oo   local-symlink-race
+           oo   local-user-file-view
+           oo   local-user-shell
+           oo   privacy-leak
+           oo   remote-code-execution
+           oo   remote-command-inject
+           oo   remote-file-creation
+           oo   remote-file-read
+           oo   remote-file-view
+           oo   remote-file-write
+           oo   remote-key-theft
+           oo   remote-root-access
+           oo   remote-root-shell
+           oo   remote-script-inject
+           oo   remote-server-admin
+           oo   remote-use-of-secret
+           oo   remote-user-access
+           oo   remote-user-file-view
+           oo   remote-user-shell
+           oo   unknown
+           oo   weak-authentication
+           oo   weak-encryption
+           oo   weak-ssl-authentication
 
      By default, the vulnerabilities file is stored in the @PKGVULNDIR@ direc-
      tory.  This can be changed by defining the environment variable



Home | Main Index | Thread Index | Old Index