aboutsummaryrefslogtreecommitdiffstats
path: root/security/vuxml
Commit message (Expand)AuthorAgeFilesLines
* security/vuxml: Sort Python entry references alphabeticallykoobs2014-03-011-1/+1
* security/vuxml: Document CVE-2014-1912 for Python 2.7 - 3.3koobs2014-03-011-0/+49
* - add entry for subversion CVE-2014-0032ohauer2014-02-271-0/+32
* Report new vulnerability in otrs to vuxmlcs2014-02-261-0/+30
* Document new vulnerabilities in www/chromium < 33.0.1750.117rene2014-02-241-0/+60
* The PostgreSQL Global Development Group has released an importantgirgen2014-02-211-39/+93
* - Last whitespace changelwhsu2014-02-161-5/+5
* Document the latest PMA security advisory: PMSA-2014-1matthew2014-02-151-0/+28
* Add CVE entry to referenceslwhsu2014-02-151-0/+2
* whitespacelwhsu2014-02-151-39/+39
* Document Jenkins Security Advisory 2014-02-14lwhsu2014-02-151-0/+131
* - Document recent vulnerabilities in www/lighttpdzi2014-02-141-0/+41
* Document phpmyfaq vulnerabilitiesflo2014-02-071-0/+30
* Update VUXML entry on recent otrs vulnerabilitiescs2014-02-071-25/+11
* Update the latest flash security advisoryeadler2014-02-051-1/+2
* Report the latest flash security issueeadler2014-02-051-0/+27
* Document mozilla vulnerabilitiesbeat2014-02-051-0/+94
* - Add modified date to libyaml entryzi2014-02-021-0/+1
* - Add libyaml to the libyaml vulnerability entryzi2014-02-021-1/+5
* - Document libyaml vulnerability in pkgbdrewery2014-02-021-0/+39
* Use the same URL as in blockquote.ehaupt2014-01-291-1/+1
* - Fix formatmiwi2014-01-291-4/+13
* Document socat vulnerability.ehaupt2014-01-291-0/+26
* 2 new OTRS vulnerabilitiescs2014-01-291-0/+51
* rt42-4.2.1_3, which appears only on the 2014Q1 branch, should also bematthew2014-01-281-1/+2
* Document vulnerabilities in www/chromium < 32.0.1700.102rene2014-01-281-0/+34
* Formatting fixesmatthew2014-01-281-14/+14
* - Fix style for strongswan entrydecke2014-01-281-7/+9
* vuxml entry concerning the recent security advisory about www/rt42matthew2014-01-281-0/+44
* - Fix typo in last entrydecke2014-01-271-1/+1
* - Document multiple DoS vulnerabilities in strongswandecke2014-01-271-0/+40
* Document Varnish HTTP Cache < 3.0.5 DoS Vulnerabilitykoobs2014-01-251-0/+46
* Update flash to 11.2r202.335eadler2014-01-241-0/+28
* Cleanup the HTMLDOC entry, long lines and remove the ...remko2014-01-231-6/+11
* Document HTMLDOC < 1.8.28 vulnerability.mandree2014-01-231-0/+26
* Document virtualbox-ose vulnerabilitiesdecke2014-01-171-0/+30
* Document new vulnerabilities in www/chromium < 32.0.1700.77rene2014-01-161-0/+45
* Sort referenceserwin2014-01-151-1/+1
* Document SA-13:07.binderwin2014-01-151-0/+9
* Fix the latest entry, it has many issues, make validateremko2014-01-151-16/+13
* Mark net/ntp forbidden.cy2014-01-151-0/+39
* Document the latest nagios vulnerability.mat2014-01-141-0/+30
* Security update to fix CVE-2014-0591 as reported atmat2014-01-141-0/+42
* Update libXfont to 1.4.7zeising2014-01-081-0/+34
* Document OpenSSL 1.0.1e multiple vulnerabilities.delphij2014-01-071-0/+33
* Correct ident for most recent entries. No functional changes.remko2013-12-291-62/+57
* - mark as FORBIDDEN (zero day SQL vuln)ohauer2013-12-231-0/+36
* Cover gnupg1 ports/packages as well.delphij2013-12-191-0/+2
* Apply vendor fix for CVE-2013-6422, cURL libcurl cert name check ignoredelphij2013-12-191-0/+43
* Add about gnupg-1.4.16.kuriyama2013-12-181-0/+45
* - document asterisk vulnerabilitiesflo2013-12-181-1/+51
* - update to 2.8.4flo2013-12-171-0/+30
* Document Zabbix agent remote command execution vulnerability.delphij2013-12-161-0/+27
* Update to 5.3.28flo2013-12-151-0/+47
* Update to nspr 4.10.2flo2013-12-141-0/+95
* - Group affected packagessunpoet2013-12-111-39/+15
* Add entry for net/samba* CVE-2012-6150 and CVE-2013-4408timur2013-12-101-0/+46
* - Document Rails vulnerabilitysunpoet2013-12-081-0/+85
* Document drupal multiple vulnerabilities.delphij2013-12-061-0/+44
* Document new vulnerabilities in www/chromium < 31.0.1650.63rene2013-12-051-0/+51
* - Document multiple XSS core vulnerabilities for Joomla!nivit2013-12-051-0/+38
* Update to version 1.3.3, which fixes an important crashy bug: denial ofdanfe2013-12-031-2/+35
* - security update to 3.3.1ohauer2013-12-011-0/+31
* - security update subversion-1.8.5 / 1.7.14 [1]ohauer2013-11-261-0/+42
* Make it more clear that "SAME URL" is actually the blockquoteremko2013-11-251-1/+1
* - Update devel/ruby-gems to 1.8.28swills2013-11-241-0/+67
* - Fix and report heap overflow in floating point parsing issue in rubyswills2013-11-231-0/+37
* Add entries about CVE-2013-4475 and CVE-2013-4476 for net/samba* ports.timur2013-11-201-0/+81
* Document new vulnerability in www/nginx (< 1.4.4) and www/nginx-devel (< 1.5.7).osa2013-11-201-0/+33
* Add back NO_STAGE which snuck away during testing.eadler2013-11-171-0/+1
* Minor tweak to standard template in order to fit with conventioneadler2013-11-172-1/+1
* Document new vulnerability in www/chromium < 31.0.1650.57rene2013-11-151-0/+27
* Fix the OpenSSH entry, a version entry should be markedremko2013-11-131-6/+4
* Update to latest flash and mark the old one as vulnerable.eadler2013-11-131-0/+28
* Document new vulnerabilities in www/chromium < 31.0.1650.48rene2013-11-131-0/+63
* - Set MAINTAINER to ports-secteamzi2013-11-121-1/+1
* - Fix versions for entry 5709d244-4873-11e3-8a46-000d601460a4bdrewery2013-11-111-4/+5
* - Document memory corruption in security/openssh-portablebdrewery2013-11-081-0/+45
* Document vulnerability in irc/quasselmakc2013-11-071-0/+28
* security/vuxml: add modified date for gnutlswg2013-11-011-0/+1
* gnutls3 3.1.15 is affected by the same vulnerabilitywg2013-11-011-1/+1
* Thunderbird is only at version 24.1.0, not 25.0flo2013-10-311-1/+2
* Add an entry for the recent mozilla vulnerabilitiesflo2013-10-311-0/+83
* - Update www/mod_pagespeed to 1.2.24.2,1swills2013-10-291-0/+29
* - Cancel the vuxml entry correctlysunpoet2013-10-281-0/+4
* - Revert previous commitsunpoet2013-10-281-33/+0
* - Document WordPress XSS vulnerabilitysunpoet2013-10-281-0/+33
* - Add url reference to 9065b930-3d8b-11e3-bd1a-e840f2096bd0jgh2013-10-261-0/+1
* - Remove report url as it is a default CVEwg2013-10-261-1/+0
* - Document gnutls3 denial of service CVEwg2013-10-251-0/+28
* Document xorg-server use after free CVE.kwm2013-10-241-0/+30
* Document pycrypto PRNG reseed race condition.delphij2013-10-191-0/+35
* - Add CVE references to WordPress 3.6.1 entryswills2013-10-191-1/+6
* - Note issues with WordPress before 3.6.1swills2013-10-191-0/+41
* - node-devel packages is vulnerable too, guessing this is going to be fixed inswills2013-10-191-0/+4
* - Update to 0.10.21 to address a security issueswills2013-10-191-0/+25
* - update to latest release [1]ohauer2013-10-181-0/+61
* Fix build by commenting out the most recent of the two discoverydes2013-10-171-1/+1
* - Fix year, move entry upak2013-10-171-32/+32
* - Document new vulnerabilities in security/dropbearak2013-10-171-0/+32
* Document new vulnerabilities in www/chromium < 30.0.1599.101rene2013-10-161-0/+39
* - update mod_fcgid to version 2.3.9ohauer2013-10-111-0/+29
* Add recent gnupg1/gnupg vuln.kuriyama2013-10-051-0/+29
* Document the last xinetd vulnerabilitysem2013-10-031-0/+26
* - Update to 1.2.9jase2013-10-021-0/+40
* Document new vulnerabilities for www/chromium < 30.0.1599.66rene2013-10-021-0/+88
* Our "package" can have multiple "name" elements. Since these packages aredelphij2013-10-011-31/+7
* - Add a low version to the graphite-web vulnbrd2013-10-011-5/+5
* - Document graphite issueswills2013-10-011-0/+44
* - ebd877b9-7ef4-4375-b1fd-c67780581898 also applies to our ruby18tabthorpe2013-09-241-0/+5
* Document CVE-2013-1443 for www/py-django{,14,-devel}lwhsu2013-09-221-0/+42
* - Split names for different packageslwhsu2013-09-221-3/+10
* Add NO_STAGE all over the place in preparation for the staging support (cat: ...bapt2013-09-211-0/+1
* - add modification date to mozilla entry, that I forgot aboutrm2013-09-191-0/+1
* - correct thunderbird version in recent mozilla entryrm2013-09-191-1/+1
* Add the latest two FreeBSD Security Advisories that have impactremko2013-09-191-0/+90
* - update firefox, thunderbird and libxul to 24.0flo2013-09-191-0/+106
* Update flash to version 11.2.202.310eadler2013-09-131-0/+30
* Document CVE-2013-4315 for www/py-django{,14,-devel}lwhsu2013-09-131-0/+35
* - update devel/subversion to 1.8.3 [1]ohauer2013-09-031-0/+34
* - Document the last cacti vulnerabilitiessem2013-08-291-0/+30
* Add CVE entries to latest entry for Asterisk.remko2013-08-291-1/+4
* Update net/asterisk to 1.8.23.1flo2013-08-291-0/+36
* Document new vulnerabilities in www/chromium < 29.0.1547.57rene2013-08-211-0/+49
* Fix multiple security issues in the bundled libav version by replacing itkwm2013-08-201-0/+67
* - Correct lcms2 VuXML entry: only versions before 2.5 are vulnerable.stas2013-08-191-1/+2
* - Update modified date of VuXML entry which was missed in r317985ashish2013-08-181-1/+1
* Correct latest entry, properly indent the paragraphsremko2013-08-171-3/+3
* Amend 689c2bf7-0701-11e3-9a25-002590860428 so that it doesn't overlap withbf2013-08-171-4/+0
* Update security/libgcrypt to 1.5.3 [1], and document the latest gnupgbf2013-08-171-0/+35
* - Update puppet to 3.2.4 which fixes CVE-2013-4761 and CVE-2013-4956brd2013-08-171-0/+37
* Correct polarssl entry, the lines were way to long, indentation wasremko2013-08-161-7/+19
* - Fix ordering of references.stas2013-08-161-1/+1
* - Add lcms2 DoS vulnerability entry.stas2013-08-161-0/+31
* Add CVE Id, which was not in the advisory,mandree2013-08-131-0/+1
* Record PolarSSL < 1.2.8 infinite loop denial of service.mandree2013-08-131-0/+29
* Add a link to the advisory.delphij2013-08-101-0/+2
* Document Samba DoS vulnerability.delphij2013-08-101-0/+43
* - update firefox to 23.0flo2013-08-091-0/+89
* Add one more reference for PuTTY 0.59-0.61 vuln CVE-2011-4607.mandree2013-08-081-0/+2
* More references for PuTTY < 0.63 vulnerabilities.mandree2013-08-081-0/+5
* Upgrade PuTTY to new 0.63 beta upstream release, adding vulnerability info.mandree2013-08-081-0/+42
* Adjust NVidia driver version ranges after r304966 to remedy false positives.danfe2013-08-071-3/+3
* - secuity update for typo3 portsohauer2013-08-061-0/+38
* - Security update of databases/phpmyadmin to 4.0.5matthew2013-08-041-0/+30
* Add new vulnerabilities for www/chromium < 28.0.1500.95rene2013-08-031-0/+43
* Modify the latest puppet entry. Because the matching of the version everythingremko2013-08-021-4/+2
* Now that PMSA-2013-{9,11-15} have been published, borrow from them tomatthew2013-07-301-12/+82
* Security update: multiple vulnerabilities in databases/phpmyadmin andmatthew2013-07-281-0/+59
* Add entry for wordpress < 3.5.2remko2013-07-281-0/+52
* Add additional reference, bump modified date.remko2013-07-271-0/+2
* Document BIND denial of service vulnerabilitydelphij2013-07-271-0/+39
* Cleanup last entry. Properly indent the entry andremko2013-07-261-13/+14
* Add an entry for security/gnupg1.kuriyama2013-07-261-0/+36
* Update to 1.6.5bjk2013-07-261-0/+31
* Add <url></url> to references.lev2013-07-251-0/+2
* Update:lev2013-07-251-0/+30
* - Update whitespace for 2fbfd455-f2d0-11e2-8a46-000d601460a4bdrewery2013-07-231-6/+4
* - Update suPHP to 0.7.2bdrewery2013-07-221-0/+36
* - change apache24 version from 2.4.5 to 2.4.6 (2.4.5 was not released)ohauer2013-07-221-1/+3
* - update to apache24-2.4.6ohauer2013-07-211-0/+32
* Document gallery3 multiple vulnerabilities.delphij2013-07-181-0/+37
* Add missing citationeadler2013-07-181-0/+2
* Add two more PHP entries for issues which have already been fixed.des2013-07-171-0/+65
* Update to 11.2r202.291eadler2013-07-161-0/+28
* Document squid 3.x denial of service vulnerability.delphij2013-07-161-0/+31
* Adjust version numbers for OTRS vulnerabilitiescs2013-07-151-3/+3
* Add missing modified dates from r321329.eadler2013-07-151-2/+6
* Wrap long lines. No content change.delphij2013-07-121-3/+15
* Security vulnerabilities in libzrtpcs2013-07-121-0/+29
* - Document ruby vulnerabilityswills2013-07-121-0/+29
* Add vulnerability on otrscs2013-07-111-0/+27
* - update to apache-2.2.25ohauer2013-07-111-7/+12
* Add new vulnerabilities for www/chromium < 28.0.1500.71rene2013-07-101-0/+69
* - add fix for CVE-2013-1862ohauer2013-07-061-5/+6
* - document apache22 CVE-2013-1862 (mod_rewrite)ohauer2013-07-061-0/+45
* Fix CVE-2013-2174 for ftp/curl with a patch from vendor fordelphij2013-07-021-1/+2
* Security update to 4.0.4.1matthew2013-07-011-0/+32
* Security update for apache-xml-security-cgirgen2013-06-281-0/+29
* - update firefox to 22.0flo2013-06-261-1/+92
* VuXML: document CVE-2013-2174, heap corruption in cURL libraryrea2013-06-241-0/+56
* - Update puppet to 3.2.2 which fixes CVE-2013-3567 [1]swills2013-06-221-0/+35
* Correct the CVE-2013-0131 entry, so that the most recent revision ofbf2013-06-221-1/+1
* - fix formating of 8b97d289-d8cf-11e2-a1f5-60a44c524f57jgh2013-06-201-1/+2
* Add extra-validation to the validation target.eadler2013-06-202-2/+5
* - Fix entry dates for some 'insane' dates. In some cases a best effort was m...eadler2013-06-201-18/+21
* Add an additional validation script to the vuxml port.eadler2013-06-201-0/+69
* Fix typo soccat -> socatcs2013-06-191-1/+1
* Add vulnerability on OTRScs2013-06-191-0/+26
* Fix date for flashpluginwrapper.delphij2013-06-181-2/+3
* Add entry for SA-13:06.mmap.delphij2013-06-181-0/+28
* Security update for apache-xml-security-c.girgen2013-06-181-0/+30
* Document Tor bug 9072bf2013-06-171-0/+25
* - Fix typo in dbus entryak2013-06-141-1/+1
* Update to 1.6.12.kwm2013-06-141-0/+30
* Update to 11.2r202.291eadler2013-06-121-0/+26
* - Document vulnerabilities in www/owncloudculot2013-06-121-0/+62
* Update to 5.3.26flo2013-06-071-0/+33
* Match only the most recent Bind9* version in the latest vulnerability,erwin2013-06-071-6/+7
* Fix typo in previous revision.erwin2013-06-061-1/+1
* Add entry for the latest Bind vulnerabilities in CVE-2013-3919.erwin2013-06-061-0/+50
* Security upgrade to 4.0.3matthew2013-06-061-0/+31
* Update to 0.16.6.kwm2013-06-051-0/+33
* Document vulnerabilities in www/chromium < 27.0.1453.110rene2013-06-051-0/+59
* - Fix buildeadler2013-06-051-5/+3
* Fix security issues in xorg client libraries.zeising2013-06-051-0/+158
* Update krb5 1.11.2 --> 1.11.3.cy2013-06-041-0/+32
* Update to 1.6.2crees2013-06-041-0/+30
* - Update to 2.7.4.araujo2013-06-031-0/+29
* Remove duplicate optipng vulnerability.rakuco2013-06-021-32/+0
* Add two more URLs to openvpn's vulnerability from March 2013 (CVE-2013-2061)mandree2013-06-021-0/+2
* - Backport fix for CVE-2013-2061 to openvpn22 and openvpn20;mandree2013-06-021-1/+5
* Document passenger vulnerability.osa2013-06-011-0/+26
* Update subversion ports to 1.7.10 and 1.6.23.lev2013-06-011-0/+89
* Actually remove bitchx-devel and add a VuXML entry.crees2013-05-311-0/+50
* - Document znc null pointer dereference vulnerability.jase2013-05-281-0/+25
* Adjust range for socat entry.ehaupt2013-05-271-1/+1
* Document socat FD leak vulnerability.ehaupt2013-05-271-0/+27
* - Add entry for ruby 1.9.3p429swills2013-05-271-0/+34
* Document couchdb XSS vulnerability.delphij2013-05-261-0/+29
* Update to 2.17.1 as the 2.18 release was postponed / cancelledflo2013-05-231-2/+3
* Fix entry date, wrongly entered in revision 318453cs2013-05-231-1/+1
* fix typo in recent otrs vulnerabilitycs2013-05-231-1/+1
* Add vulnerabilitiescs2013-05-231-0/+52
* Security Updatesmatthew2013-05-231-0/+103
* Fix vuxml by using the correct format for CVE names.rene2013-05-221-14/+14
* List vulnerabilities fixed in www/chromium 27.0.1453.93 (which is therene2013-05-221-0/+66
* Patch multiple vulnerabilities in x11-toolkits/plib.rakuco2013-05-191-0/+69
* - Update to 0.7.4rakuco2013-05-191-0/+32
* Update the recent nginx entry to cover the exact version range and includedelphij2013-05-171-7/+18
* Update to the latest version of Adobe Flasheadler2013-05-161-0/+38
* - update firefox to 21.0flo2013-05-161-0/+80
* Update ranges according latest available information.osa2013-05-141-2/+2
* - Update emacs entry to correct the version ranges for CVE-2012-3479ashish2013-05-131-1/+1
* Update nginx entry to reflect the right version ranges for CVE-2013-2028.delphij2013-05-081-2/+3
* Fix typo.osa2013-05-071-1/+1
* Document nginx -- a stack-base buffer overflow.osa2013-05-071-0/+31
* - fix strongSwan discovery date /2013-05-03/2013-04-30/ohauer2013-05-041-1/+1
* - update to version 5.0.4 which fixes CVE-2013-2944.ohauer2013-05-041-0/+34
* Document Jenkins Security Advisory 2013-05-02lwhsu2013-05-041-0/+56
* - Add the vendor patch for SQUID-2012:1 (CVE-2012-5643) and update VuXMLtmseck2013-05-031-2/+3
* Add entry for SA-13:05.nfsserverdes2013-04-301-0/+28
* - Document multiple XSS and DDoS vulnerabilities for Joomla!nivit2013-04-281-0/+62
* Security updae to 3.5.8.1matthew2013-04-251-0/+53
* - Security update to 1.0.21dinoex2013-04-231-0/+25
* - Security fixdinoex2013-04-211-1/+1
* Document PMASA-2013-1matthew2013-04-201-0/+29
* Document roundcube arbitrary file disclosure vulnerability.delphij2013-04-201-0/+30
* - add jasperdinoex2013-04-181-0/+32
* - Update to 2.7.3 due a vulnerability that affect all versions 2.x. [1]araujo2013-04-161-0/+33