aboutsummaryrefslogtreecommitdiffstats
path: root/security/vuxml
Commit message (Expand)AuthorAgeFilesLines
...
* Document the latest three FreeBSD Security Advisories:remko2006-03-241-0/+127
* xorg-server -- privilege escalationlesi2006-03-221-0/+30
* - heimdal -- Multiple vulnerabilitiesmnag2006-03-201-0/+44
* Document ftp/curl's TFTP packet buffer overflow vulnerabilityvd2006-03-201-0/+35
* Add drupal <= 4.6.5 vulns.brooks2006-03-181-0/+52
* Add an entry for Horde < 3.1 (SA19246).thierry2006-03-161-0/+38
* Document linux-flashplugin -- arbitrary code execution vulnerability.simon2006-03-151-0/+39
* Document nfs -- remote denial of service (FreeBSD: SA-06:10)remko2006-03-131-0/+51
* Add OpenSSH Remote Denial of Service (FreeBSD SA-06:09.openssh) to theremko2006-03-131-0/+71
* Correct the gpg entry wrt. style.remko2006-03-111-34/+34
* Update to 1.4.2.2.kuriyama2006-03-101-0/+34
* Document multimedia/mplayer's heap overflow in the ASF demuxervd2006-03-091-0/+35
* Add the ssh2-nox11 slave port to the list of ports affected bymarius2006-03-061-0/+2
* Document a SSH.COM SFTP server format string vulnerability affectingmarius2006-03-051-0/+33
* Document GNU tar invalid headers buffer overflow.naddy2006-03-041-0/+27
* Remove the pinentry entry. It was gentoo specific and I overlookedremko2006-02-281-33/+0
* Document Bugzilla [2.*, 2.20.1) vulnerabilities.skv2006-02-271-0/+25
* Document squirrelmail (< 1.4.6) vulnerabilities:delphij2006-02-251-0/+25
* Remove the latest squid entry, it already existed.remko2006-02-211-28/+0
* Document gedit -- format string vulnerability.remko2006-02-211-0/+28
* Add koffice to the RTF import issue.remko2006-02-201-1/+7
* Documenet WebCalendar -- unauthorized access vulnerability.remko2006-02-201-0/+27
* Document abiword -- stack based buffer overflow vulnerabilities.remko2006-02-201-0/+30
* Document pinentry -- local privilege escalation.remko2006-02-201-1/+34
* Document squid -- dns lookup spoofing.remko2006-02-201-0/+28
* Document postgresql81-server -- SET ROLE privilege escalation.simon2006-02-181-0/+30
* Document gnupg -- false positive signature verification.simon2006-02-171-0/+39
* Document rssh -- privilege escalation vulnerability.remko2006-02-161-0/+33
* Document tor -- malicious tor server can locate a hidden service.remko2006-02-161-0/+29
* Document sudo -- arbitrary command execution.remko2006-02-161-0/+36
* Document libtomcrypt -- weak signature scheme with ECC keys.remko2006-02-161-0/+25
* Document mantis -- "view_filters_page.php" cross site scripting vulnerability.remko2006-02-161-0/+33
* Document phpbb -- multiple vulnerabilities.remko2006-02-161-0/+43
* Document postgresql -- character conversion and tsearch2 vulnerabilities.remko2006-02-161-0/+46
* Document heartbeat -- insecure temporary file creation vulnerability.remko2006-02-161-0/+28
* Document kpdf -- heap based buffer overflowremko2006-02-151-0/+29
* Document perl, webmin, usermin -- perl format string integer wrap vulnerabilityremko2006-02-151-0/+46
* Document phpicalendar -- cross site scripting vulnerability andremko2006-02-151-0/+54
* Document FreeBSD -- Infinite loop in SACK handling (FreeBSD SA 06.08)remko2006-02-141-0/+36
* Document pf -- IP fragment handling panic, FreeBSD SA 06.07remko2006-02-141-0/+41
* Document FreeBSD -- Local kernel memory disclosureremko2006-02-141-0/+38
* Document IEEE 802.11 -- buffer overflow (FreeBSD SA 06.05).remko2006-02-141-0/+35
* Add FreeBSD SA 06.04.ipfw to the vuln.xml list.remko2006-02-141-0/+36
* Mark ivtools 1.2.3 as fixed for jpeg vulnerabilities. Note that thissimon2006-02-081-10/+25
* Document kpopup -- local root exploit and local denial of service.simon2006-02-081-0/+41
* Oops. Forgot to modify the discovery date.remko2006-01-281-1/+2
* Add 4 FreeBSD advisories to the VuXML database.remko2006-01-271-0/+188
* SHA256ifyedwin2006-01-241-2/+9
* Document local root exploit in SGE.brooks2006-01-241-0/+28
* Document "fetchmail -- crash when bouncing a message" DOS vulnerability.barner2006-01-231-0/+32
* - Update description and references for "clamav -- possible heapsimon2006-01-151-4/+16
* Add an entry for clamav/clamav-develehaupt2006-01-101-0/+30
* Document milter-bogom -- headerless message crash.simon2006-01-101-0/+29
* Mark latest bnc version as fixed wrt. to "fd_set -- bitmap indexsimon2006-01-101-2/+6
* Document two bogofilter vulnerabilities.simon2006-01-071-0/+69
* Add an entry for rxvt-unicode < 6.3: root privileges were not restoredthierry2006-01-051-0/+30
* `ru-apache' and `ru-apache+mod_ssl' was patchet against CAN-2005-3352lev2006-01-041-1/+8
* Correct a little typo.remko2006-01-031-2/+2
* Document apache -- mod_imap cross-site scripting flaw.remko2006-01-021-1/+68
* Fix the affected versions of 9b4facec-6761-11da-99f6-00123ffe8333.hrs2006-01-011-1/+2
* Add missing "</package>" tag from rev. 1.917, which caused the file tosimon2005-12-261-4/+5
* russian/apache13 and russian/apache13-modssl were updated and new version d...lev2005-12-231-3/+8
* Bump modification date for entries touched by last commit.simon2005-12-231-1/+2
* Update the phpSysInfo entries, PR ports/90849 will solve the documentedremko2005-12-231-2/+2
* Fix another typo in my nbd entry.remko2005-12-231-1/+2
* Correct a typo.remko2005-12-231-1/+1
* Update the affected range.remko2005-12-231-1/+1
* :remko2005-12-231-0/+25
* - Register scponly-4.1 vulnerabilitiesgarga2005-12-231-0/+48
* Correct the recent horde entries as per the FDPremko2005-12-221-30/+40
* Document fetchmail vulnerability:barner2005-12-191-0/+36
* Document the following mantis vulnerabilities:remko2005-12-151-0/+64
* - Add entries for several XSS vulnerabilities in Horde, Kronolith, Nagthierry2005-12-121-2/+148
* Add curl -- URL buffer overflow vulnerabilitymnag2005-12-091-0/+46
* Add phpmyadmin -- register_globals emulation "import_blacklist" manipulationmnag2005-12-081-0/+67
* Add ffmpeg -- libavcodec buffer overflow vulnerabilitymnag2005-12-071-0/+39
* Add trac -- search module SQL injection vulnerabilitymnag2005-12-071-0/+32
* Add drupal -- multiple vulnerabilitiesmnag2005-12-021-0/+56
* Document opera -- multiple vulnerabilities.simon2005-12-011-0/+50
* Document opera -- command line URL shell command injection.simon2005-12-011-0/+40
* Add entry to www/mambomnag2005-11-301-0/+35
* Backup rev 1.9 which should not have been committed since it was just mysimon2005-11-291-2/+2
* Mark flyspar 0.9.8 as fixed wrt. "flyspray -- cross-site scriptingsimon2005-11-292-3/+5
* Change topic zope28 to zope (www/zope affected too)mnag2005-11-281-5/+6
* Security fix: several shell scripts included in the Ghostscript packagehrs2005-11-281-0/+40
* Standarize the horde -- Cross site scripting vulnerabilities in MIMEremko2005-11-261-10/+16
* Add an entry for cross site scripting vulnerabilities in Horde's MIMEthierry2005-11-231-0/+34
* phpmyadmin -- HTTP Response Splitting vulnerabilitymnag2005-11-161-0/+32
* Add CVE name to an old sudo entry.simon2005-11-151-0/+2
* Update latest phpSysInfo entry to reflect that 2.4 was in fact not fixedsimon2005-11-141-1/+2
* - Micromedia -> Macromediasem2005-11-141-6/+6
* - Document phpSysInfo vulnerabilitysem2005-11-141-0/+34
* - Document flashplugin vulnerabilitysem2005-11-141-0/+43
* - Document p5-Mail-SpamAssassin vulnerabily (alread fixed in ports)sem2005-11-101-0/+66
* Update the recent gallery2 and webcalendar entries:remko2005-11-091-5/+14
* Document qpopper -- multiple privilege escalation vulnerabilities.remko2005-11-081-0/+32
* - Add missed </p> tag [1]sem2005-11-071-2/+3
* Add a bit more info from the PEAR advisory about the vulnerability tosimon2005-11-051-0/+4
* The two latest OpenVPN vulnerabilities were both only for 2.0 andsimon2005-11-051-2/+4
* Add an entry for pear-PEAR arbitrary code execution vulnerability.thierry2005-11-051-0/+28
* Correct skype entry to match the correct fixed port version number.simon2005-11-021-1/+2
* Document two OpenVPN vulnerabilities.simon2005-11-021-0/+67
* As Peter Jeremy points out, the recent lynx vulnerability also concernsnaddy2005-11-021-0/+5
* - Document skype vulnerabilitiessem2005-11-011-2/+75
* - Document CVE-2005-3258:sem2005-11-011-0/+32
* - Document a BASE Basic Analysis and Security Engine vulnerabilitysem2005-11-011-0/+29
* Back out the accidentally committed white-space modification parts ofsimon2005-11-011-8900/+12898
* Add entry for "fetchmail -- fetchmailconf local password exposure",barner2005-10-311-0/+31
* Document lynx remote buffer overflow in NNTP header handling.naddy2005-10-311-12960/+8995
* - Fix a ruby vulnerabuility in the safe level settings.sem2005-10-281-0/+36
* Add more references to entry net-snmp -- remote DoS vulnerability.simon2005-10-271-0/+3
* - Mark linux-firefox 1.0.7 as fixedsimon2005-10-261-5/+6
* Add misc/compat5x to "openssl -- potential SSL 2.0 rollback".lesi2005-10-261-1/+8
* Also mark xli as vulnerable to xloadimage -- buffer overflows in NIFFsimon2005-10-241-0/+5
* For entry libgadu -- multiple vulnerabilities:simon2005-10-241-2/+3
* For entry zope28 -- expose RestructuredText functionality to untrustedsimon2005-10-231-3/+5
* Add another reference to clamav -- arbitrary code execution and DoSsimon2005-10-221-0/+2
* Document x11/xloadimage buffer overflows in NIFF image title handling.naddy2005-10-201-0/+39
* Rename all CAN-yyyy-nnnn to CVE-yyyy-nnnn, with the exception of textnectar2005-10-201-688/+688
* For entry: snort -- Back Orifice preprocessor buffer overflow vulnerability:simon2005-10-191-1/+2
* - Document snort -- Back Orifice preprocessor buffer overflow vulnerability.simon2005-10-191-2/+50
* - Document www/webcalendar vulnerability.sem2005-10-151-0/+23
* - Document www/gallery2 vulnerability.sem2005-10-151-0/+35
* Improve last couple of entries:simon2005-10-131-13/+17
* Add entry for opensslmnag2005-10-121-3/+57
* Add entry for phpmyadmin (PMASA-2005-4)mnag2005-10-121-0/+29
* Fix typo with range valuesmnag2005-10-121-1/+1
* Add entry from zope28mnag2005-10-121-0/+30
* For libxine -- format string vulnerability entry:simon2005-10-101-5/+6
* Add an entry for libxine format string vulnerability.nobutaka2005-10-101-0/+31
* Mark older revisions linux_base-suse 9.3 as vulnerable to kdebase --simon2005-10-091-0/+5
* - Mark cfengine's arbitrary file overwriting vulnerability as fixed in 2.1.6_1sergei2005-10-071-0/+6
* Add an entry for UW-IMAP Mailbox Name Handling Remote Buffer Overflowthierry2005-10-061-0/+35
* Add credit for recent ftp/weex incidentehaupt2005-10-051-1/+1
* rinetd >= 0.62_1 has no more vulnerabilitiesgarga2005-10-041-2/+5
* Add references to three squid entries.remko2005-10-031-5/+15
* Use the <freebsdpr> tag to markup a PR in weex -- remote format stringsimon2005-10-031-1/+1
* Document a format string vulnerability in ftp/weex.jylefort2005-10-031-0/+30
* Document picasm -- buffer overflow vulnerability.simon2005-10-021-0/+33
* Add an URL to the entry of the japanese/uim.nobutaka2005-10-021-1/+1
* Document japanese/uim privilege escalation vulnerability.nobutaka2005-10-021-0/+31
* Document cfengine -- arbitrary file overwriting vulnerability.simon2005-10-011-0/+32
* Mark zsync <= 0.4.1 vulnerable to the zlib buffer overflow vulnerability.remko2005-10-011-0/+5
* Add more references to unace -- multiple vulnerabilities entry.simon2005-10-011-0/+3
* Add CVE name to an older ProZilla entry.simon2005-10-011-0/+2
* Add more references for latest phpmyfaq entry.simon2005-09-301-0/+9
* - Add a note that new entries, per convention, should be added to thesimon2005-09-301-5/+11
* Document vulnerabilities in www/phpmyfaqvsevolod2005-09-291-0/+25
* Add linux_base-suse-9.3 to the zlib entry.remko2005-09-241-0/+5
* Document clamav -- arbitrary code execution and DoS vulnerabilities.simon2005-09-241-0/+39
* - Be consistent and call entries "firefox & mozilla", not the other waysimon2005-09-241-2/+12
* - Document mozilla & firefox -- multiple vulnerabilities.simon2005-09-241-0/+147
* Add real references to urban -- stack overflow vulnerabilities.simon2005-09-221-5/+3
* Document mozilla & firefox -- command line URL shell command injection.simon2005-09-221-0/+87
* Add CVE name for tor -- diffie-hellman handshake flaw.simon2005-09-221-0/+2
* Correct package name for entry bind -- buffer overrun vulnerability.simon2005-09-221-1/+2
* Add CVE name to an older CUPS issue.simon2005-09-221-0/+2
* Fix the htdig entry, the port version and the VuXML version did notremko2005-09-201-1/+1
* Fix the squirrelmail entry since only versions prior to 1.4.5 wereremko2005-09-201-1/+2
* Document the following items:remko2005-09-181-0/+60
* - Add an entry on possible DOS condition regarding NTLM in squidpav2005-09-161-0/+28
* Document X11 server -- pixmap allocation vulnerability.lesi2005-09-151-0/+33
* Document unzip -- permission race vulnerability. [1]remko2005-09-141-1/+35
* Document firefox & mozilla -- buffer overflow vulnerability.simon2005-09-111-0/+97
* Mark the latest version of cups-base fixed for "xpdf -- disk fill DoSlawrance2005-09-071-2/+2
* Add forgotten </package> line.remko2005-09-041-0/+1
* Mark b2evolution prior to 0.9.0.12_2 vulnerable to the XML_RPC remote php cod...remko2005-09-041-1/+5
* Document htdig -- cross site scripting vulnerability.remko2005-09-041-0/+29
* - Document two squid security related issues.sem2005-09-041-0/+55
* Document bind9 -- denial of service.remko2005-09-041-0/+44
* Document bind -- buffer overrun vulnerabilityremko2005-09-041-0/+28
* Add a more or less bogus reference section to the last entry, to make itsimon2005-09-021-0/+7
* Document stack overflow vulnerabilities in games/urban.jylefort2005-09-021-0/+22
* Mark latest evolution port version as fixed wrt. evolution -- remotesimon2005-08-301-1/+2
* Add entry for fswiki's vuln.kuriyama2005-08-291-0/+22
* Dante 1.1.15 is no longer affected by the fd_set bitmap index overflow.niels2005-08-291-2/+5
* - Fill out part of the std. VuXML template missed in the last entry.simon2005-08-291-2/+3
* Document evolution -- remote format string vulnerabilities.simon2005-08-281-0/+43
* Document pam_ldap -- authentication bypass vulnerability.simon2005-08-281-0/+32
* Mark phpgroupware as vulnerable to pear-XML_RPC -- remote PHP codesimon2005-08-281-1/+6
* Document pcre -- regular expression buffer overflow.simon2005-08-271-0/+29
* Mark latest awstats port as fixed for awstats -- arbitrary codesimon2005-08-241-1/+2
* Document mail/elm remote buffer overflow vulnerability.sem2005-08-241-0/+34
* Document four vulnerabilities in openvpn:remko2005-08-191-0/+123
* Also mark phpAdsNew as affected by "pear-XML_RPC -- remote PHP codesimon2005-08-181-1/+6
* Add the fixed version so that people do not get a stale portaudit when the up...remko2005-08-181-7/+7
* Document tor -- diffie-hellman handshake flaw.remko2005-08-181-0/+31
* gpdf has been fixed for "xpdf -- disk fill DoS vulnerability", mark itsimon2005-08-171-0/+4
* Add eGroupWare to the list of packages affected by "pear-XML_RPC --simon2005-08-171-0/+6
* Document acroread -- plug-in buffer overflow vulnerability.simon2005-08-171-0/+42
* Add phpmyfaq and drupal to the "pear-XML_RPC -- remote PHP codesimon2005-08-161-1/+15
* Document pear-XML_RPC -- remote PHP code injection vulnerability.simon2005-08-151-0/+36
* Document awstats -- arbitrary code execution vulnerability.simon2005-08-151-0/+45
* After further examination it turns out that gnugadu does not includesimon2005-08-131-2/+1
* Remove pl-gnugadu2 and kadu from being affected by libgadu -- multiplesimon2005-08-121-5/+0
* Document libgadu -- multiple vulnerabilities.simon2005-08-121-0/+78
* Document gaim -- AIM/ICQ away message buffer overflow and gaim --simon2005-08-121-0/+65
* Remove pdftohtml from the list of packages affected by xpdf -- disksimon2005-08-121-4/+0
* Document xpdf -- disk fill DoS vulnerability.simon2005-08-121-0/+45
* Mark apache 1.3.33_2 as fixed for apache -- http request smuggling.simon2005-08-111-2/+3
* Document gforge -- XSS and email flood vulnerabilities.simon2005-08-091-0/+46
* Document postnuke -- multiple vulnerabilities.simon2005-08-081-0/+47
* Document mambo -- multiple vulnerabilities.simon2005-08-051-0/+41
* Correct the ranges for the IPSec advisory and the devfs advisory.remko2005-08-051-3/+3
* Document some recent FreeBSD advisories:remko2005-08-051-0/+105
* Add some more entries to the apache -- http smuggling vulnerability.remko2005-08-041-2/+14
* Document proftpd -- format string vulnerabilities.simon2005-08-041-0/+37
* Note that the fix for gnupg -- OpenPGP symmetric encryptionsimon2005-08-041-0/+9
* Mark p5-Crypt-OpenPGP, pgp, and pgpin as vulnerable to gnupg --simon2005-08-031-0/+7
* Mark latest gdal version as fixed for all tiff vulnerabilities.simon2005-08-021-9/+24
* Added nbsmtp format string vulnerability.niels2005-08-011-0/+28
* Mark latest the linux-tiff and pdflib ports safe from latest tiffsimon2005-08-011-1/+8
* Document sylpheed -- MIME-encoded file name buffer overflowsimon2005-07-311-0/+31
* Document phpmyadmin -- cross site scripting vulnerability.simon2005-07-311-0/+30
* Document gnupg -- OpenPGP symmetric encryption vulnerability.simon2005-07-311-0/+37
* Bump entry date.remko2005-07-311-1/+1
* Document vim -- vulnerabilities in modeline handling: glob, expand.remko2005-07-311-0/+36
* Document that ekg -- insecure temporary file creation was fixed insimon2005-07-311-1/+2
* Add pdflib-perl, fractorama, gdal, iv, ivtools, ja-iv, ja-libimg,simon2005-07-311-3/+56
* Change MAINTAINER address for ports maintained by the Security Team tosimon2005-07-311-1/+1
* Document tiff -- buffer overflow vulnerability.simon2005-07-301-0/+39
* - Misc. markup/whitespace fixes.simon2005-07-301-39/+23
* Document jabberd vulnerabilities that were fixed by the latest update.vsevolod2005-07-301-0/+37
* Be consistent and use the same title for the latest etherealsimon2005-07-301-1/+1
* Document opera -- image dragging vulnerability and opera -- downloadsimon2005-07-301-0/+78
* Document ethereal -- multiple vulnerabilities.simon2005-07-301-0/+71
* - Fix apache 2.1 range for CAN-2005-2088 entry which prevents apache 2.0 fromclement2005-07-281-1/+4
* Mark apache+mod_ssl-1.3.33+2.8.22_1 as not vulnerable in the latest Apache en...remko2005-07-281-1/+2
* There must be an curse. s/il/li/.remko2005-07-281-7/+7
* Update my latest Apache entry to make clear that this only affects certainremko2005-07-281-1/+12
* Document apache -- http request smuggling.remko2005-07-271-0/+64
* Set modified date in entry for previous commit.erwin2005-07-261-0/+1
* Note that the fd_set vulnerability in net/bld was fixed in 0.3.3erwin2005-07-261-1/+4
* Document clamav -- multiple remote buffer overflows.hrs2005-07-251-0/+46
* - Document isc-dhcpd -- format string vulnerabilities (oldersimon2005-07-231-1/+37
* Add entry for eGroupWare's recent vulnerabilities.kuriyama2005-07-231-0/+31
* Document denial of service attack in fetchmail 6.5.2.1.barner2005-07-221-0/+30
* Update phppgadmin entry to note that it was fixed in 3.5.4 and add asimon2005-07-221-1/+4
* Document dnrd -- remote buffer and stack overflow vulnerabilities.simon2005-07-221-0/+33
* Fix typo in last commitsimon2005-07-211-1/+1
* Add more references to latest fetchmail entry [1] and sort referencessimon2005-07-211-1/+4
* Document an issue with the LDAP backend provided by PowerDNS.trhodes2005-07-211-0/+30
* Document fetchmail -- remote root/code injection from malicious POP3simon2005-07-211-0/+28
* o add kdebase (kate) vulnarability.mich2005-07-191-0/+33
* Add CVE names to recent bugzilla entry.simon2005-07-181-0/+3
* - Document firefox & mozilla -- multiple vulnerabilities.simon2005-07-161-1/+126
* Add an entry for the drupal vulnerabilities.erwin2005-07-161-0/+27
* Fixed incorrect newsfetch and mnogosearch affected package versionsniels2005-07-151-2/+2
* Markup fixed version of net-snmp problem.kuriyama2005-07-131-1/+2
* Correct a typo: s/lemote/remote/remko2005-07-101-1/+1