aboutsummaryrefslogtreecommitdiffstats
path: root/ports-mgmt/portaudit-db
Commit message (Expand)AuthorAgeFilesLines
* Packaudit: switch to Subversionrea2013-04-102-4/+23
* Remove 2004 aspell entry that has long since been dealt with.dougb2011-09-051-1/+0
* Remove entry 2de14f7a-dad9-11d8-b59a-00061bc2ad93 (Multiplesimon2008-12-012-46/+0
* Fix the reference to portaudit, which is in ports-mgmt now.remko2007-03-291-1/+1
* Correct the location of the portaudit-db port.remko2007-02-192-1/+2
* Populate a new ports-mgmt category. List of moved ports:pav2007-02-051-1/+1
* Change MAINTAINER address for ports maintained by the Security Team tosimon2005-07-311-1/+1
* - Set maintainership to security@.simon2005-07-041-1/+1
* Grab maintainer-ship of portaudit. While I do not currently have anysimon2005-06-151-1/+1
* Document Horde's XSS vulnerabilities.thierry2005-01-051-0/+1
* Create a VuXML entry for Horde XSS help window vulnerability to replacenectar2004-10-271-1/+0
* Add an entry for a vulnerability fixed in horde-2.2.7.thierry2004-10-271-0/+1
* Add entries for vulnerabilites in imported xpdf code in kdegraphicslofi2004-10-241-0/+2
* Add an entry for a XSS vulnerability fixed in IMP-3.2.6.thierry2004-10-121-0/+1
* - star-devel: privilege escalationeik2004-09-092-1/+7
* - XSS vulnerability in phpGroupWare wiki moduleeik2004-09-072-8/+42
* multiple vulnerabilities in LHAeik2004-09-041-0/+36
* grrrr... left the test case intacteik2004-09-041-1/+1
* - add some referenceseik2004-09-043-8/+142
* samba printer change notification request DoSeik2004-08-311-0/+1
* add some references, add ru-gaimeik2004-08-301-2/+4
* multiple vulnerabilities in gaimeik2004-08-301-4/+4
* security bug in rscsi client codeeik2004-08-301-0/+4
* Document NSS SSLv2 server buffer overflow (already referenced innectar2004-08-271-1/+0
* Document ripMIME decoding bug (already referenced in portaudit.txt).nectar2004-08-271-1/+0
* Argh. Duplicate entry for "Scorched 3D server chat box format string vulnerab...eik2004-08-271-2/+1
* Mozilla / NSS S/MIME DoS vulnerability & Scorched 3D server chat box format s...eik2004-08-271-0/+2
* Note sanitize_path bug in rsync (already referenced in portaudit.txt).nectar2004-08-271-1/+0
* Document buffer overflows in SoX (already referenced in portaudit.txt).nectar2004-08-271-1/+0
* Document cookie bug in Konqueror (already referenced in portaudit.txt).nectar2004-08-271-1/+0
* Remove libxine issue which is now documented in the FreeBSD VuXMLnectar2004-08-251-1/+0
* nss library SSL remote buffer overfloweik2004-08-251-0/+1
* multiple buffer overflows in xveik2004-08-251-2/+3
* Konqueror cross-domain cookie injectioneik2004-08-241-0/+1
* handle some duplicateseik2004-08-243-2/+71
* a2ps: Possible execution of shell commands as local user.eik2004-08-211-1/+2
* correct topic of eda0ade6-f281-11d8-81b0-000347a4fa7deik2004-08-201-1/+1
* QT 3.x BMP (and possibly other graphics formats) heap-based overfloweik2004-08-201-0/+1
* potential security flaws in mod_ssleik2004-08-191-4/+6
* move a800386e-ef7e-11d8-81b0-000347a4fa7d to xmleik2004-08-173-9/+36
* ruby CGI::Session insecure file creationeik2004-08-161-1/+2
* multiple phpGroupWare vulnerabilitieseik2004-08-161-0/+2
* phpGedView, jftpgweik2004-08-163-0/+29
* apply xlist not to the own fileseik2004-08-142-10/+15
* fix some vuxml duplicates, add sympa unauthorized list creationeik2004-08-143-8/+680
* Add another entry for kdelibs3 due to another missed patch.lofi2004-08-131-0/+1
* Correct entries for recent kde vuln's and add new entry for kdelibslofi2004-08-131-1/+3
* fix security hole in non-chroot rsync daemon.eik2004-08-121-0/+1
* 9fb5bb32-d6fa-11d8-b479-02e0185c0b53 is a duplicate of 40800696-c3b0-11d8-864...eik2004-08-122-2/+5
* f72ccf7c-e607-11d8-9b0a-000347a4fa7d is a duplicate of 6f955451-ba54-11d8-b88...eik2004-08-122-4/+7
* Factor out all but one of the build switches of the KDE main module portslofi2004-08-111-0/+2
* libine "vcd:" input source buffer overfloweik2004-08-101-0/+1
* SpamAssassin DoS & cfengine authentication heap corruptioneik2004-08-101-2/+4
* CVStrac arbitrary remote code executioneik2004-08-071-1/+2
* fold entry 7eded4b8-e6fe-11d8-b12f-0a001f31891a into 2de14f7a-dad9-11d8-b59a-...eik2004-08-062-1/+4
* putty local command executiondinoex2004-08-061-0/+1
* move abe47a5a-e23c-11d8-9b0a-000347a4fa7d to vuxml, add mozilla to the list o...eik2004-08-061-1/+0
* o Security Update to 2.2.10-ja-1.0.nork2004-08-061-0/+1
* add Opera "location" object write access vulnerabilityeik2004-08-051-0/+1
* move f9e3e60b-e650-11d8-9b0a-000347a4fa7d to vuxml, add mozilla to the list o...eik2004-08-051-3/+0
* back out last commitdinoex2004-08-051-1/+0
* putty local command executiondinoex2004-08-051-0/+1
* libPNG stack-based buffer overflow and other code concernseik2004-08-051-0/+3
* Acrobat Reader handling of malformed uuencoded pdf fileseik2004-08-041-0/+1
* Squid NTLM authentication helper overfloweik2004-08-041-0/+1
* ripMIME attachment extraction bypasseik2004-08-041-4/+5
* GnuTLS certificate chain verification DoSeik2004-08-031-1/+3
* phpMyAdmin configuration manipulation and code injectioneik2004-07-311-1/+2
* Register a vulnerability in mail/imp3.thierry2004-07-311-0/+1
* Mozilla Firefox certificate spoofingeik2004-07-301-0/+1
* DansGuardian banned extension filter bypass vulnerabilityeik2004-07-301-0/+1
* add a reference to the SoX buffer overflow entryeik2004-07-291-1/+1
* SoX buffer overflows when handling .WAV fileseik2004-07-291-1/+2
* LCDProc buffer overflow/format string vulnerabilitieseik2004-07-281-0/+1
* pavuk digest auth buffer overfloweik2004-07-271-0/+1
* add Nessus "adduser" race condition and Dropbear DSS verification bugeik2004-07-271-2/+5
* l2tpd BSS-based buffer overfloweik2004-07-231-0/+1
* phpBB cross site scripting vulnerabilitieseik2004-07-221-0/+1
* add subversion-perl, subversion-pythoneik2004-07-201-0/+1
* subversion access control bypasseik2004-07-201-0/+1
* mod_ssl format string vulnerabilityeik2004-07-181-0/+2
* Roundup directory traversaleik2004-07-161-1/+2
* wv library datetime field buffer overfloweik2004-07-141-0/+1
* multiple vulnerabilities in Bugzillaeik2004-07-141-0/+1
* correct vulnerable version of linux-png and add a referenceeik2004-07-111-2/+2
* libpng row buffer overfloweik2004-07-111-0/+2
* add some referenceseik2004-07-091-0/+4
* move e5e2883d-ceb9-11d8-8898-000d6111a684 to vuln.xmleik2004-07-081-2/+0
* add some referenceseik2004-07-061-3/+3
* MySQL versions < 4.1 seem to be unaffectedeik2004-07-061-2/+2
* add MySQL server authentication bypass / buffer overfloweik2004-07-061-0/+2
* Mark 4aec9d58-ce7b-11d8-858d-000d610a3b12 as a duplicate of theeik2004-07-053-1/+28
* Move phpnuke vulnerabilities to VuXML.trhodes2004-07-031-1/+0
* move "phpMyAdmin code injection" to vuxmleik2004-07-021-1/+0
* phpMyAdmin code injectioneik2004-07-021-0/+1
* - SSLtelnet remote format string vulnerabilityeik2004-07-011-7/+8
* add MIT Kerberos 5 krb5_aname_to_localname() buffer overfloweik2004-06-291-0/+1
* add isakmpd security association deletion vulnerabilityeik2004-06-291-2/+3
* add Apache input header folding DoS vulnerabilityeik2004-06-291-0/+1
* xine-lib RTSP handling vulnerabilitieseik2004-06-281-0/+1
* Move MoinMoin entry to VuXML.trhodes2004-06-281-1/+0
* diversify url conversioneik2004-06-281-1/+21
* add portaudit2vuxml.pl to easy the migration of entries to VuXMLeik2004-06-261-0/+129
* Add an entry for recent isc-dhcp3-server buffer overflows.trhodes2004-06-261-1/+0
* Move giFT-FastTrack to VuXML.trhodes2004-06-261-1/+0
* giFT-FastTrack remote DoSeik2004-06-251-0/+1
* Update to 0.2.2eik2004-06-254-7/+10
* correct rlpr versioneik2004-06-251-2/+2
* Pure-FTPd DoS when the max number of connection is reachedeik2004-06-251-0/+1
* Move the Gallery entry to VuXML.trhodes2004-06-251-1/+0
* rlpr local and remote exploitable buffer overflow (CAN-2004-0393, CAN-2004-0454)eik2004-06-241-0/+1
* CAN-2004-0451: format string vulnerabilities in supeik2004-06-241-0/+1
* Security flaw in rssheik2004-06-241-1/+2
* Icecast remote DoS vulnerabilityeik2004-06-241-0/+1
* it seems like isc-dhcp3-{client,devel} are unaffectedeik2004-06-231-1/+1
* reword gallery entryeik2004-06-231-1/+4
* Sqwebmail 4.0.4 XSS vulnerabilityeik2004-06-221-0/+1
* Roundup remote file disclosure vulnerabilityeik2004-06-221-0/+1
* mailman allows 3rd parties to retrieve member passwords (CAN-2004-0412)weik2004-06-211-0/+1
* super format string vulnerabilityeik2004-06-211-0/+1
* Scorched 3D server chat box format string vulnerabilityeik2004-06-211-0/+1
* BNBT Authorization Header DoSeik2004-06-211-0/+1
* - The previous commit included ruby18-raspell-0.1, which is not affected.thierry2004-06-211-1/+2
* Security: fix a buffer overflow in word-list-compress:thierry2004-06-201-0/+1
* ircd-hybrid-7 low-bandwidth DoSeik2004-06-201-0/+2
* make BASEURL customizableeik2004-06-182-3/+11
* add subversion-perl, subversion-pythoneik2004-06-181-1/+1
* added racoon certificate validation bugeik2004-06-171-0/+1
* update to 0.2eik2004-06-173-8/+15
* add moinmoin, phpnuke and webmin vulnerabilitieseik2004-06-171-0/+3
* SquirrelMail has a localized japanese versioneik2004-06-161-0/+1
* Add SquirrelMail XSS vulnerabilityeik2004-06-161-0/+1
* typoeik2004-06-152-2/+2
* Point all vulnerabilities to the base URL, so that entrieseik2004-06-152-3/+14
* update to 0.1.1, supporting some of the VuXML 1.1 featureseik2004-06-146-53/+194
* reword some descriptionseik2004-06-141-6/+6
* Change URLs for a better reference about IMP & Chora vulnerabilities.thierry2004-06-131-2/+2
* Add an entry for Chora and IMP.thierry2004-06-131-0/+2
* Added CAN-2004-0488, CAN-2004-0492, DBMail vulnerability, smtpproxy vulnerabi...eik2004-06-131-4/+9
* portaudit-db generates a portaudit database from a currenteik2004-06-1310-0/+644