security/vuxml: Mark zeek < 3.0.4 as vulnerable as per:
https://github.com/zeek/zeek/blob/e059d4ec2e689b3c8942f4aa08b272f24ed3f612/NEWS
An attacker can crash Zeek remotely via crafted packet sequence via
a stack overflow in POP3 analyzer.
security/vuxml: Mark zeek < 3.0.4 as vulnerable as per: Tags None Referenced Files None Subscribers None
Description
Details
|