aboutsummaryrefslogtreecommitdiffstats
path: root/security/vuxml
Commit message (Expand)AuthorAgeFilesLines
* - Fix typo in dbus entryak2013-06-141-1/+1
* Update to 1.6.12.kwm2013-06-141-0/+30
* Update to 11.2r202.291eadler2013-06-121-0/+26
* - Document vulnerabilities in www/owncloudculot2013-06-121-0/+62
* Update to 5.3.26flo2013-06-071-0/+33
* Match only the most recent Bind9* version in the latest vulnerability,erwin2013-06-071-6/+7
* Fix typo in previous revision.erwin2013-06-061-1/+1
* Add entry for the latest Bind vulnerabilities in CVE-2013-3919.erwin2013-06-061-0/+50
* Security upgrade to 4.0.3matthew2013-06-061-0/+31
* Update to 0.16.6.kwm2013-06-051-0/+33
* Document vulnerabilities in www/chromium < 27.0.1453.110rene2013-06-051-0/+59
* - Fix buildeadler2013-06-051-5/+3
* Fix security issues in xorg client libraries.zeising2013-06-051-0/+158
* Update krb5 1.11.2 --> 1.11.3.cy2013-06-041-0/+32
* Update to 1.6.2crees2013-06-041-0/+30
* - Update to 2.7.4.araujo2013-06-031-0/+29
* Remove duplicate optipng vulnerability.rakuco2013-06-021-32/+0
* Add two more URLs to openvpn's vulnerability from March 2013 (CVE-2013-2061)mandree2013-06-021-0/+2
* - Backport fix for CVE-2013-2061 to openvpn22 and openvpn20;mandree2013-06-021-1/+5
* Document passenger vulnerability.osa2013-06-011-0/+26
* Update subversion ports to 1.7.10 and 1.6.23.lev2013-06-011-0/+89
* Actually remove bitchx-devel and add a VuXML entry.crees2013-05-311-0/+50
* - Document znc null pointer dereference vulnerability.jase2013-05-281-0/+25
* Adjust range for socat entry.ehaupt2013-05-271-1/+1
* Document socat FD leak vulnerability.ehaupt2013-05-271-0/+27
* - Add entry for ruby 1.9.3p429swills2013-05-271-0/+34
* Document couchdb XSS vulnerability.delphij2013-05-261-0/+29
* Update to 2.17.1 as the 2.18 release was postponed / cancelledflo2013-05-231-2/+3
* Fix entry date, wrongly entered in revision 318453cs2013-05-231-1/+1
* fix typo in recent otrs vulnerabilitycs2013-05-231-1/+1
* Add vulnerabilitiescs2013-05-231-0/+52
* Security Updatesmatthew2013-05-231-0/+103
* Fix vuxml by using the correct format for CVE names.rene2013-05-221-14/+14
* List vulnerabilities fixed in www/chromium 27.0.1453.93 (which is therene2013-05-221-0/+66
* Patch multiple vulnerabilities in x11-toolkits/plib.rakuco2013-05-191-0/+69
* - Update to 0.7.4rakuco2013-05-191-0/+32
* Update the recent nginx entry to cover the exact version range and includedelphij2013-05-171-7/+18
* Update to the latest version of Adobe Flasheadler2013-05-161-0/+38
* - update firefox to 21.0flo2013-05-161-0/+80
* Update ranges according latest available information.osa2013-05-141-2/+2
* - Update emacs entry to correct the version ranges for CVE-2012-3479ashish2013-05-131-1/+1
* Update nginx entry to reflect the right version ranges for CVE-2013-2028.delphij2013-05-081-2/+3
* Fix typo.osa2013-05-071-1/+1
* Document nginx -- a stack-base buffer overflow.osa2013-05-071-0/+31
* - fix strongSwan discovery date /2013-05-03/2013-04-30/ohauer2013-05-041-1/+1
* - update to version 5.0.4 which fixes CVE-2013-2944.ohauer2013-05-041-0/+34
* Document Jenkins Security Advisory 2013-05-02lwhsu2013-05-041-0/+56
* - Add the vendor patch for SQUID-2012:1 (CVE-2012-5643) and update VuXMLtmseck2013-05-031-2/+3
* Add entry for SA-13:05.nfsserverdes2013-04-301-0/+28
* - Document multiple XSS and DDoS vulnerabilities for Joomla!nivit2013-04-281-0/+62
* Security updae to 3.5.8.1matthew2013-04-251-0/+53
* - Security update to 1.0.21dinoex2013-04-231-0/+25
* - Security fixdinoex2013-04-211-1/+1
* Document PMASA-2013-1matthew2013-04-201-0/+29
* Document roundcube arbitrary file disclosure vulnerability.delphij2013-04-201-0/+30
* - add jasperdinoex2013-04-181-0/+32
* - Update to 2.7.3 due a vulnerability that affect all versions 2.x. [1]araujo2013-04-161-0/+33
* - Update to 0.85bdrewery2013-04-151-0/+26
* Replace duplicate vids with a newly generated GUID.eadler2013-04-131-3/+3
* Oops, fix the cite URL.des2013-04-131-1/+1
* Edit OpenVPN 2.3.1 entry:des2013-04-131-4/+4
* Update flash to 11.2r202.280eadler2013-04-121-0/+29
* - Add url reference to 1431f2d6-a06e-11e2-b9e0-001636d274f3bdrewery2013-04-111-0/+1
* - Update to 3.2.13 to fix security vulnerabilitiesbdrewery2013-04-111-0/+54
* - Document CVE-2013-0131 for nvidia-driverbdrewery2013-04-091-0/+34
* Typo fix for the typo fix. Validated with make validate this time.flo2013-04-091-1/+1
* Fix a typo in the recent mozilla entryflo2013-04-091-1/+2
* - Security udpate to 12.15dinoex2013-04-071-0/+30
* - fix subversion rangeohauer2013-04-071-2/+2
* - Subversion 1.7.9 security update [1]ohauer2013-04-061-5/+53
* Vulnerability in OTRScs2013-04-061-0/+29
* The PostgreSQL Global Development Group has released a securitygirgen2013-04-041-0/+57
* - update thunderbird, firefox-esr, linux-thunderbird and linux-firefox toflo2013-04-041-0/+86
* Document two latest FreeBSD security advisories.delphij2013-04-031-0/+65
* - update japanes/bugzilla templatesohauer2013-04-011-1/+5
* security upgrade to OpenVPN 2.3.1; upstream release notes aremandree2013-04-011-0/+27
* Update to 2.8.0. [1]kwm2013-03-291-0/+32
* Update asterisk ports to:flo2013-03-291-0/+41
* Explicitly use -E for sed(1).delphij2013-03-281-1/+1
* Add entry for latest Bind advisory CVE-2013-2266erwin2013-03-271-0/+39
* In validate target, use unexpand and sed to make sure that we are usingdelphij2013-03-271-0/+11
* Document vulnerabilities in www/chromium < 26.0.1410.43rene2013-03-271-0/+64
* Remove trailing space, no content change.delphij2013-03-271-2/+2
* unexpand vuln.xml.delphij2013-03-271-828/+828
* firebird vulnerability entry (CVE-2013-2492)acm2013-03-261-0/+33
* - Document vulnerability in graphics/optipng (CVE-2012-4432)zi2013-03-261-0/+32
* Update to 5.3.23flo2013-03-191-0/+37
* - Document recent vulnerabilities in www/piwigo: CVE-2013-1468, CVE-2013-1469zi2013-03-181-0/+37
* Fix typo in the libpurple entry.remko2013-03-171-1/+2
* - Perl vulnerability (CVE-2013-1667) also applies to perl-threadedzi2013-03-151-0/+6
* - graphics/libexif:pclin2013-03-141-0/+35
* Update flash the latest (hopefully) secure version.eadler2013-03-131-0/+29
* - Update puppet to 3.1.1 resolving multiple security issuesswills2013-03-131-0/+158
* Perl 5.x: fix CVE-2013-1667rea2013-03-111-0/+40
* - Fix previous entrymiwi2013-03-101-6/+10
* Belatedly add an entry for libpurple's recent vulnerabilities.marcus2013-03-101-0/+35
* - update thunderbird, firefox-esr, linux-thunderbird and linux-firefox toflo2013-03-091-0/+49
* Document a vulnerability in chromium < 25.0.1364.160rene2013-03-081-0/+27
* - Document vulnerabilities in typo3.culot2013-03-061-0/+42
* Document vulnerabilities in www/chromium < 25.0.1364.152rene2013-03-061-0/+56
* - Document recent vulerability in security/stunnel (CVE-2013-1762)zi2013-03-041-0/+35
* - document apache22 issuesohauer2013-03-031-21/+67
* Document two sudo problems.wxs2013-03-011-0/+61
* - Update to 0.9.14 to fix CVE-2013-1756swills2013-02-281-0/+31
* Update to 11.2r202.273eadler2013-02-271-0/+28
* - Update affected ettercap versions: CVE-2012-0722 was fixed in 0.7.5.2-Assim...sunpoet2013-02-271-1/+1
* - Document 3 OTRS vulnerabilities from 2012bdrewery2013-02-261-0/+102
* - Document Ruby REXML DoSswills2013-02-251-0/+33
* - Document rubygem-ruby_parser issueswills2013-02-251-0/+27
* - Document Django 2013-02-21 vulnerabiltypclin2013-02-241-0/+70
* Document vulnerabilities in www/chromium < 25.0.1364.97rene2013-02-231-0/+94
* Document security/krb5 1.11 and prior null pointer dereference in thecy2013-02-231-0/+26
* Convert the ! back into a 1.remko2013-02-221-1/+1
* Add the latest two FreeBSD Security Advisories.remko2013-02-221-0/+58
* Document drupal7 Denial of serviceflo2013-02-211-0/+30
* - add an entry for net/nss-pam-ldapd stack-based buffer overflowrm2013-02-201-0/+29
* Fix up the latest gecko update by:flo2013-02-201-1/+2
* - update bugzilla ports to latest versionohauer2013-02-201-0/+45
* - update firefox to 19.0flo2013-02-201-0/+76
* - Fix version range for recent ruby vulnerabilities (d3e96508-056b-4259-88ad-...zi2013-02-191-2/+2
* Combine ranges into one entry to prevent false positiveseadler2013-02-181-4/+2
* - Document rubygem-rack issueswills2013-02-181-0/+32
* - Document activemodel issueswills2013-02-181-0/+36
* Document Jenkins Security Advisory 2013-02-16lwhsu2013-02-171-0/+41
* - add entry for dns/poweradminrm2013-02-171-0/+26
* - Document ruby json issueswills2013-02-161-0/+49
* - Document vulnerability in rdocswills2013-02-161-0/+40
* Update flash to the latest versioneadler2013-02-091-0/+28
* - Fix whitespacesmiwi2013-02-081-33/+32
* Fix vuxml buildeadler2013-02-071-1/+1
* - report openssl vulnerabilitiesdinoex2013-02-071-0/+32
* - update databases/mariadb-server to 5.3.12 [1]flo2013-02-021-0/+45
* - report opera 12.12 vulnerabilitiesdinoex2013-02-011-0/+32
* Document devel/upnp vulnerabilitiespawel2013-01-311-0/+48
* Document wordpress multiple vulnerabilities.delphij2013-01-301-0/+51
* Fix last entry: version 2.3.4 is also affectedcs2013-01-251-1/+1
* Fix whitespace in previous commit.wxs2013-01-251-6/+6
* XSS vulnerability in py-django-cmscs2013-01-251-0/+30
* Document vulnerabilities in www/chromium < 24.0.1312.56rene2013-01-231-0/+37
* - update www/drupal6 to 6.28flo2013-01-211-0/+31
* VuXML: add newly-allocated CVE for SQUID-2012:1rea2013-01-171-0/+1
* VuXML: document buffer overflow in ettercap (CVE-2013-0722)rea2013-01-171-0/+32
* VuXML: document recent security manager bypass in Java 7.xrea2013-01-171-0/+91
* Properly limit the match for PHP 5.3.x and 5.2.x versions.delphij2013-01-161-2/+2
* Apply version ranges of php53 and php52 to php5 as well.delphij2013-01-161-1/+3
* - Fix discovery date on nagios vulnerability (CVE-2012-6096)zi2013-01-111-1/+1
* www/squid3x: upgrade to 3.1.23 and 3.2.6rea2013-01-111-3/+4
* - Document vulnerability in net-mgmt/nagios (CVE-2012-6096)zi2013-01-111-0/+28
* Document vulnerabilities in www/chromium < 24.0.1312.52rene2013-01-111-0/+100
* - update firefox, thunderbird, linux-firefox and linux-thunderbird to 17.0.2flo2013-01-101-0/+130
* Fix <topic> style: common dash style, remove softvare versionssem2013-01-091-14/+14
* - Update rubygem-rails to 3.2.11swills2013-01-091-0/+91
* - Properly copy namespace attributes/resolve make validate issueszi2013-01-091-18/+5
* Document Jenkins 2013-01-04 Security Advisorylwhsu2013-01-081-0/+39
* VuXML: extend entry for MoinMoin vulnerabilities fixed in 1.9.6rea2013-01-071-11/+30
* Document Django 2012-12-10 vulnerabiltylwhsu2013-01-071-0/+74
* VuXML: fix r309982rea2013-01-061-3/+3
* VuXML for MoinMoin issues: add CVE referencesrea2013-01-061-0/+4
* Freetype 2.4.8 vulnerabilities were already documented.crees2013-01-051-22/+2
* Mark moinmoin vulnerablecrees2013-01-051-0/+83
* Bump copyright to 2013.erwin2013-01-041-1/+1
* Add correct version numbers to the recent asterisk entryflo2013-01-041-2/+2
* - update net/asterisk to 1.8.19.1flo2013-01-041-0/+38
* Note charybdis and ircd-ratbox vulnerabilitiescrees2013-01-021-0/+32
* Separate entries for Puppet 2.6 and 2.7.anders2012-12-311-2/+35
* Add OTRS vulnerabilitiescs2012-12-311-0/+91
* VuXML entries for Tomcat: split into three distinct onesrea2012-12-301-15/+73
* VuXML: add entry for DoS in Squid's cachemgr.cgirea2012-12-291-0/+35
* Remove invalid entrybdrewery2012-12-191-22/+0
* - add entry for opera 12.11dinoex2012-12-191-0/+56
* Fix typo.delphij2012-12-141-1/+1
* - add url block in references for 1657a3e6-4585-11e2-a396-10bf48230856jgh2012-12-141-0/+1
* Update linux-f10-flashpulgin11 to 11.2r202.258 to address multipledelphij2012-12-141-0/+28
* Document vulnerabilities in www/chromium < 23.0.1271.97rene2012-12-121-0/+43
* - Fix recent vulnerability entry for www/tomcat[67]zi2012-12-061-1/+1
* - Document recent vulnerabilities in www/tomcat6 and www/tomcat7zi2012-12-061-0/+43
* Update to the latest patch level from ISC:erwin2012-12-051-0/+42
* Add URL for recent bogofilter heap vuln', CVE-2012-5468, aka. vuln vid=mandree2012-12-041-0/+1
* Update bogofilter to new upstream release 1.2.3.mandree2012-12-041-0/+25
* Document vulnerabilities in www/chromium < 23.0.1271.95rene2012-11-301-0/+30
* www/yahoo-uiohauer2012-11-301-2/+2
* Fix date in yahoo-ui entry.wxs2012-11-281-1/+2
* - document www/yahoo-ui security issue and mark port forbidden [1]ohauer2012-11-281-1/+38
* Describe new vulnerabilities in www/chromium < 23.0.1271.91rene2012-11-271-0/+42
* - Update backports patch to 20121114flo2012-11-251-7/+2
* Add entries for the following advisories:wxs2012-11-251-0/+91
* - opera -- execution of arbitrary codedinoex2012-11-231-0/+34
* Document new vulnerability in www/lighttpd 1.4.31mm2012-11-211-0/+32
* - Update firefox and thunderbird to 17.0flo2012-11-211-0/+119
* - Fix copy and paste error in latest weechat entryjase2012-11-181-1/+2
* - Document new vulnerability in irc/weechat and irc/weechat-develjase2012-11-181-0/+33
* - bugzilla security updates to version(s)ohauer2012-11-151-0/+57
* - Update recent weechat entry (e02c572f-2af0-11e2-bb44-003067b2972c)jase2012-11-141-1/+4
* Document vulnerabilities in two typo3 components.rene2012-11-131-0/+38
* Fix typo.madpilot2012-11-121-1/+1
* - Update to 2.7.1madpilot2012-11-121-0/+27
* - Improve latest ruby entry slightlyswills2012-11-101-2/+2
* - Modify recent e02c572f-2af0-11e2-bb44-003067b2972c entryjase2012-11-101-5/+8
* Apply an upstream patch that fixes a security holeeadler2012-11-101-0/+30
* - Update lang/ruby19 to 1.9.3p327swills2012-11-101-0/+35
* - clarification that ASF reported issue for:jgh2012-11-101-2/+4
* - document tomcat vulnerabilitiesjgh2012-11-101-0/+76
* Update latest version and document security issueseadler2012-11-091-0/+32
* Document new vulnerabilities in www/chromium < 23.0.1271.64rene2012-11-071-0/+66
* Document opera vulnerabilitiescrees2012-11-071-0/+42
* Fix minor typoeadler2012-11-061-1/+2
* Update latest version and document security issueseadler2012-11-061-0/+60
* Correct plural of "vulnerability"crees2012-11-031-2/+2
* - update apache22 to version 2.22.23ohauer2012-11-032-5/+47
* Add entry for webmin < 1.600_1 (potential XSS attack).olgeni2012-11-031-0/+26
* - Document ruby vulnerabilities:bdrewery2012-11-021-0/+81
* Update to 3.8.15flo2012-11-011-0/+59
* - update to 7.16 [1]rm2012-10-311-0/+40
* - Update www/firefox{,-i18n} to 16.0.2flo2012-10-291-0/+55
* mail/exim: upgrade to 4.80.1rea2012-10-261-0/+39
* - add CVE reference (still in reserved state) for recent django vulnerabiltyrm2012-10-261-0/+1
* - update django ports to 1.3.4 and 1.4.2, that fixing couple of security issues.rm2012-10-251-0/+63
* Document multiple wireshark vulnerabilities.wxs2012-10-221-0/+50
* - clarify end-user impact for 57652765-18aa-11e2-8382-00a0d181e71djgh2012-10-181-11/+4
* - document xlockmore issue, 57652765-18aa-11e2-8382-00a0d181e71d, CVE-2012-4524jgh2012-10-181-0/+37
* - xinetd vulnerabilitysem2012-10-181-0/+33
* - Updated ZF advisory to include similar XEE vulnerabilityglarkin2012-10-161-4/+12
* - Document Zend Framework XXE injection vulnerabilityglarkin2012-10-161-0/+35
* Update the distinfo as upstream has changed.eadler2012-10-161-2/+2
* Add the CVE for the gitolite vuln.eadler2012-10-161-0/+1
* - Actually commit the VuXML entryswills2012-10-161-0/+33
* Document the latest security vulnerabilities for phpMyAdmin.matthew2012-10-151-0/+36
* - Add in additional package names for recent bind vulnerabilityzi2012-10-141-0/+16
* - update to 16.0.1flo2012-10-121-9/+18
* Document a new vulnerability in www/chromium < 22.0.1229.94rene2012-10-111-0/+27
* - Update firefox-esr, thunderbird-esr, linux-firefox and linux-thunderbird to...flo2012-10-111-0/+108
* Upgrade to the latest BIND patch level:erwin2012-10-101-0/+38
* Document new vulnerabilities in www/chromium < 22.0.1229.92rene2012-10-091-0/+40
* - correct the range in last entry (le/lt typo)rm2012-10-031-1/+1
* - update to 2.8.10rm2012-10-031-0/+36
* Mark nvidia-driver-173.14.35_1 as not vulnerable.danfe2012-09-281-1/+1
* Document vulnerabilities in www/chromium < 22.0.1229.79rene2012-09-271-0/+96
* - Document remote code execution in ePerl (all versions)glarkin2012-09-261-0/+36
* - Documented PNG file DoS vulnerability in ImageMagick and GraphicsMagickglarkin2012-09-261-0/+49
* Update vuxml to indicate which versions are vulnerable.eadler2012-09-231-1/+3
* - Update php52 backports patch to 20120911bdrewery2012-09-201-2/+86
* - CVE-2012-2688 was addressed by php52-5.2.17_10bdrewery2012-09-201-1/+2
* Upgrade to the latest BIND patch level:dougb2012-09-191-0/+47
* Document Jenkins Security Advisory 2012-09-17lwhsu2012-09-181-0/+41
* include newly 'awarded' CVEeadler2012-09-161-0/+1
* Add vuxml for older versions of multimedia/vlc .nox2012-09-161-0/+30
* Tell the world about the recent bacula vulneadler2012-09-151-0/+31
* - Update to 0.10.22.6 which fixes two security issuesswills2012-09-131-0/+50
* Update NVIDIA arbitrary memory access vulnerability with CVE-2012-4225.danfe2012-09-121-2/+16
* - Update entry for net/freeradius2 to reflect local patch to address cve-2012...zi2012-09-111-1/+2