security/vuxml: Mark zeek < 5.0.1 as vulnerable as per:
https://github.com/zeek/zeek/releases/tag/v5.0.1
The potential DoS vulnerabilities include:
- Fix a possible overflow and crash in the ARP analyzer when receiving a specially crafted packet.
- Fix a possible overflow and crash in the Modbus analyzer when receiving a specially crafted packet.
- Fix two possible crashes when converting IP headers for output via the raw_packet event.
- Fix an abort related to an error related to the ordering of record fields when processing DNS EDNS headers via events
Reported by: Tim Wojtulewicz