| Commit message (Collapse) | Author | Age | Files | Lines |
|
|
|
|
|
|
|
| |
- Split the port to server, frontend, agent and proxy slaves
- Add zabbix16 for people who don't want to update to 1.8 yet
PR: ports/141364
Submitted by: Jim Riggs <ports@christianserving.org> (maintainer)
|
|
|
|
|
|
|
| |
PR: ports/139091
Submitted by: Jim Riggs <ports@christianserving.org>(maintainer)
Approved by: jadawin(co-mentor)
Feature safe: yes
|
|
|
|
| |
starting with N
|
|
|
|
|
| |
PR: ports/135904, ports/135905
Submitted by: Jim Riggs <ports@christianserving.org> (maintainer)
|
|
|
|
|
|
|
|
| |
- Pass maintainer to submitter (last 3 updates were timeouts)
PR: ports/133448
Submitted by: Jim Riggs <ports@christianserving.org>
Approved by: maintainer timeout
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
Note:
Input appended to and passed via the "extlang" parameter to the "calc_exp2()"
function in include/validate.inc.php is not properly sanitised before being
used. This can be exploited to inject and execute arbitrary PHP code.
The application allows users to perform certain actions via HTTP requests
without performing any validity checks to verify the requests. This can be
exploited to e.g. create users by enticing a logged in administrator to
visit a malicious web page.
Input passed to the "srclang" parameter in locales.php (when "next" is set
to a non-NULL value) is not properly verified before being used to include
files. This can be exploited to include arbitrary files from local resources
via directory traversal attacks and URL-encoded NULL bytes.
- Bump PORTREVISION
PR: 132944
Submitted by: Eygene Ryabinkin <rea-fbsd@codelabs.ru> (many thanks!)
Approved by: maintainer timeout (security 1 day)
Security: http://www.vuxml.org/freebsd/03140526-1250-11de-a964-0030843d3802.html
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
Note:
Input appended to and passed via the "extlang" parameter to the "calc_exp2()"
function in include/validate.inc.php is not properly sanitised before being
used. This can be exploited to inject and execute arbitrary PHP code.
The application allows users to perform certain actions via HTTP requests without
performing any validity checks to verify the requests. This can be exploited to e.g.
create users by enticing a logged in administrator to visit a malicious web page.
Input passed to the "srclang" parameter in locales.php (when "next" is set to a non-NULL
value) is not properly verified before being used to include files. This can be
exploited to include arbitrary files from local resources via directory traversal
attacks and URL-encoded NULL bytes.
Original Advisory:
http://www.ush.it/team/ush/hack-zabbix_162/adv.txt
With hat: secteam
Security: http://www.vuxml.org/freebsd/03140526-1250-11de-a964-0030843d3802.html
|
|
|
|
|
|
| |
PR: ports/130901, ports/130902
Submitted by: Jim Riggs <ports@christianserving.org>
Approved by: maintainer timeout (1 month)
|
|
|
|
|
|
| |
PR: ports/129781
Submitted by: Jim Riggs <ports at christianserving.org>
Approved by: maintainer timeout (3 weeks)
|
|
|
|
|
| |
PR: ports/127617
Submitted by: Dmitry Lohansky <d.lohansky at zsupport.ru> (maintainer)
|
|
|
|
|
|
|
|
|
| |
1.5.2. The version 1.5.2 beaks client/server set.
- Bump PORTEPOCH.
Discussed with: Frank Wall <fw@luzy.moov.de>, Philip M. Gollucci <pgollucci@p6m7g8.com>
Approved by: maintainer implicit.
|
|
|
|
|
|
| |
PR: ports/123512
Submitted by: Philip M. Gollucci <pgollucci@p6m7g8.com>
Approved by: maintainer timeout (> 2 weeks)
|
|
|
|
|
|
|
|
| |
- Update maintainer address.
PR: ports/122284, ports/122285
Submitted by: Dmitriy Kirhlarov <dimma@higis.ru>
Approved by: Dmitry Lohansky <d.lohansky@zsupport.ru> (maintainer)
|
|
|
|
|
| |
PR: ports/121740
Submitted by: Dmitry Lohansky <sq@tvfaq.ru>
|
|
|
|
| |
Release notes: http://www.zabbix.com/rn1.4.4.php
|
| |
|
|
|
|
|
| |
Changes: http://zabbix.com/rn1.4.3.php
Submitted by: Dmitriy Kirhlarov <dimma xx higis.ru>
|
|
|
|
|
| |
- Always link server against pthread libs when sqlite3 is selected
- Clean up a bit
|
|
|
|
|
|
| |
- Register in ports/GIDs
Relnotes: http://www.zabbix.com/rn1.4.1.php
|
|
|
|
|
|
|
| |
- Squatter UID 122 in UIDs
PR: ports/113935
Submitted by: Drew Baxter <droobie@maine.rr.com>
|
|
|
|
|
| |
PR: ports/113658
Repocopy by: marcus
|
|
|
|
|
|
| |
- Move out agent into net/zabbix-agent
- New option for checking ldap servers (on by default)
- Lots of minor fixes
|
|
|
|
|
|
|
| |
- Tweaks and fixes
Approved by: maintainer timeout, months of inactivity
Cheers from: EuroBSDCon 2006 Developer Summit
|
| |
|
|
|
|
| |
at that time and no PRs have been submitted to fix it.
|
|
|
|
| |
Approved by: portmgr (self)
|
|
|
|
|
| |
PR: ports/66923
Submitted by: Sergey Akifyev (maintainer)
|
| |
|
|
|
|
|
|
|
| |
ports that belong here than the ones I have identified and moved in
this, first, pass.
Approved in principle by: marcus
|
|
Zabbix is software for application and network monitoring.
Zabbix supports both polling and trapping techniques to
collect data from monitored hosts. Flexible notification
mechanism allows easy and quckly configure email notifications
for pre-defined events. Zabbix is freely available under
the terms of the GNU General Public License (GPL).
PR: ports/54565
Submitted by: Sergey Akifyev <asa@gascom.ru>
|