aboutsummaryrefslogtreecommitdiffstats
path: root/security
Commit message (Expand)AuthorAgeFilesLines
* I can't believe I had that link line backwards and I tested it. Anywaysjeh2004-11-221-2/+3
* Update to 0.0.15krion2004-11-222-3/+3
* Fix WWW: line.krion2004-11-221-1/+1
* Upgrade to version 4.40ejeh2004-11-223-25/+28
* - Update to 0.99pav2004-11-213-3/+5
* Add CVE reference for the SA-04:16.fetch entry.simon2004-11-211-0/+1
* - uvscan depends on libm.so.2jeh2004-11-212-8/+18
* Update to 20041119krion2004-11-212-3/+3
* Update to 4.4.8krion2004-11-212-3/+3
* With portmgr hat on, reset inactive maintainer. These ports are now uplinimon2004-11-201-1/+1
* Document vulnerability in phpmyadmin.josef2004-11-201-0/+25
* Update to DAT 4409jeh2004-11-192-3/+3
* Update to 0.2.1krion2004-11-192-3/+3
* Update to 2.4.3krion2004-11-192-3/+3
* Add localized versions of gd port to the VuXML entry.josef2004-11-191-0/+2
* - Update to 0.31 (see http://untroubled.org/cvm/NEWS for details)sergei2004-11-193-3/+12
* Document SA-04:16.fetch.simon2004-11-181-0/+36
* Update to 1.5mat2004-11-182-3/+3
* Update to DAT 4408jeh2004-11-182-3/+3
* Update to 0.3.1:vs2004-11-187-83/+185
* Fix build on 5.x.demon2004-11-182-3/+37
* Update to latest release of sudomharo2004-11-182-4/+4
* Add security/hpn-ssh, a high performance SSH based on OpenSSH, after abrooks2004-11-184-35/+31
* Update to DAT 4407jeh2004-11-182-3/+3
* Document the buffer overrun vulnerability in samba3josef2004-11-181-0/+27
* Correct range for xpdf vulnerability, as cups-base got a fixingjosef2004-11-181-1/+1
* Update to sudo-1.6.3p8, which *really* includes the CDPATH fix, androam2004-11-173-15/+5
* - Use "tail -F" rather than "tail -f".kuriyama2004-11-174-0/+61
* The last commit to japanese/samba also fixed the security issuejosef2004-11-171-1/+4
* Add CVE name to twiki entry.simon2004-11-171-0/+1
* Add teTeX-base to affected packages in xpdf's vuxml entry.josef2004-11-171-0/+4
* strip out CDPATHmharo2004-11-162-1/+11
* Document arbitrary shell command execution in twiki.simon2004-11-151-0/+33
* fix CAN-2004-0884.ume2004-11-152-1/+20
* Update to 20041114:vs2004-11-152-3/+3
* Document a format string vulnerability in proxytunnel.simon2004-11-151-0/+36
* - Update maintainer's email addresspav2004-11-1511-20/+20
* Correct URL to ddos_scan homepage.simon2004-11-151-1/+1
* - Update to 0.99sem2004-11-142-3/+3
* Update to version 0.0.19krion2004-11-143-5/+3
* Fix link issue under FreeBSD-4.X due to unsupported functions.cy2004-11-146-33/+69
* Update termlog from 2.0 to 2.2csjp2004-11-142-3/+3
* Fix entry date for the ruby entry from the last commit.simon2004-11-131-1/+1
* - Document at DoS in the Ruby CGI module.simon2004-11-131-0/+60
* Chase the Gaim 1.0.3 update.marcus2004-11-132-2/+2
* Update to 1.6.8p2mharo2004-11-132-4/+4
* Mention newly available pinentry-gtk2 in pkg-message.lofi2004-11-131-0/+1
* Add CVE name for gnats issue.nectar2004-11-121-1/+2
* Remove conditional runtime dependency on the gtar port, it's availablelofi2004-11-122-4/+0
* Note (likely) remotely exploitable vulnerability in samba 3.nectar2004-11-121-0/+33
* Document vulnerability in GNATS.josef2004-11-121-0/+24
* Document a XSS in squirrelmail.simon2004-11-121-0/+32
* Fix entry date.josef2004-11-121-1/+1
* Document BNC vulnerability.josef2004-11-121-0/+25
* Update to 1.0.3krion2004-11-122-4/+3
* - Reset bouncing maintainer's address:pav2004-11-121-1/+1
* Add spike-proxy, a professional-grade tool for looking for application-levelpav2004-11-126-0/+3346
* Update to 0.2.0krion2004-11-125-11/+59
* Note old hafiye bug.nectar2004-11-121-0/+36
* Bump PORTREVISION to reflect security update.nectar2004-11-121-0/+1
* Fix a format string vulnerability in ez-ipupdate.naddy2004-11-111-0/+27
* Document a buffer overflow in ImageMagick's EXIF parser.simon2004-11-111-0/+26
* Correct recent Apache 2 entry to not match Apache 1.X.simon2004-11-111-1/+2
* Change the libident dependency from BUILD_DEPENDS to LIB_DEPENDS.knu2004-11-111-1/+2
* Document vulnerability in Apache 2 (CAN-2004-0942).josef2004-11-111-0/+26
* Update the libxml vulnerability to indicate the fixed version.marcus2004-11-111-1/+2
* Update to DAT 4406jeh2004-11-112-3/+3
* Bump 29 ports that use GCONF_SCHEMAS. Somehow, the diff of GNOME 2.8.x hasmezz2004-11-102-2/+2
* Add pear-File_Passwd, class to manipulate and authenticate against standard U...pav2004-11-104-0/+38
* Document a format string vulnerability in socat.simon2004-11-101-0/+33
* - Update to 2.0.2pav2004-11-102-3/+3
* Document remote buffers overflow in libxml and libxml2.simon2004-11-101-0/+32
* - Add a hint on complete removal when deinstallingsem2004-11-102-0/+39
* - Add a hint on complete removal when deinstallingsem2004-11-102-0/+39
* The bugs discovered by Chris Evans have been fixednectar2004-11-101-2/+2
* Add security/sks - SKS OpenPGP Key Server:sergei2004-11-108-0/+134
* Massive ports move to better categories.skv2004-11-093-7/+3
* Update to DAT 4405jeh2004-11-092-3/+3
* warn to create sasldb2 by yourself in BATCH mode.ume2004-11-091-0/+4
* Remove the md5crk port. The cracking effort was ended after atrevor2004-11-094-45/+0
* - Update to 2.2.0sem2004-11-0811-18/+820
* Fix pkgnames for mod_include vulnerability.josef2004-11-081-6/+6
* Update to KDE 3.3.1lofi2004-11-084-6/+24
* Document a virus detection evasion in p5-Archive-Zip.simon2004-11-081-0/+27
* Add gnomekeyringmanager.marcus2004-11-081-0/+1
* Bump PORTREVISIONS for all ports that depend on atk or pango to ease in themarcus2004-11-0811-7/+11
* Add some files missed in the previous GNOME 2.8 update.marcus2004-11-0812-0/+184
* Presenting GNOME 2.8 for FreeBSD (2.8.1 to be exact).marcus2004-11-0810-14/+96
* - Update to 20041106pav2004-11-062-3/+3
* - Fix plistpav2004-11-062-1/+2
* Document mod_include vulnerability in apache and related ports.josef2004-11-061-0/+54
* - Upgrade to 2.2.0sem2004-11-0614-21/+2082
* - drop objects for win and vmsdinoex2004-11-061-0/+14
* - cleanup fipsdinoex2004-11-063-6/+17
* Update to 1.1kevlo2004-11-062-3/+3
* Document an insecure temporary file creation in postgresql-contrib.simon2004-11-061-0/+31
* Bump modified date in the entry for the last commit.simon2004-11-061-0/+1
* Update latest mpg123 entry to note that the port is fixed in the mostsimon2004-11-061-1/+1
* - Update to 2.2.0pav2004-11-064-21/+8
* There was a gd 1.X port with portepoch 2 for a while, so let the gdsimon2004-11-051-0/+1
* Document an integer overflow in the GD Graphics Library.simon2004-11-051-0/+33
* Add p5-POE-Component-SSLify 0.03, integrate SSL into POE.skv2004-11-055-0/+43
* Add p5-Filter-Crypto 1.00,skv2004-11-055-0/+75
* - Update to 20041101pav2004-11-0511-161/+181
* Add pinentry-gtk2, a GTK+ 2.0 version of the GnuPG password dialoglofi2004-11-052-0/+21
* Fix some brainos.lofi2004-11-051-6/+7
* Add hooks for new -gtk2 slaveport.lofi2004-11-053-4/+42
* - Update to 2.0.1pav2004-11-042-3/+3
* Correct entry date for the putty entry.simon2004-11-041-1/+1
* Document vulnerability in puttyjosef2004-11-041-0/+28
* - add patch files and unbreak this portleeym2004-11-044-8/+25
* Add an entry for a wzdftpd remote DoS.simon2004-11-041-0/+22
* Updates to the bogofilter entry:simon2004-11-041-1/+4
* Update to DAT 4404jeh2004-11-042-3/+3
* - Update to 4.0.5pav2004-11-032-3/+3
* - Update to 2.0.0pav2004-11-034-32/+23
* Update linux-openmotif to 2.2.4 to fix the security.mezz2004-11-021-1/+4
* A long-overdue dequoting of COMMENT. D'oh, I thought I'd done this,roam2004-11-023-3/+3
* - update to 1.1clsung2004-11-012-3/+3
* Update to 1.7.6.marcus2004-10-313-18/+17
* Add a sudo dependency and dependency on libutil.cy2004-10-303-0/+9
* Correct some tty handling problems.cy2004-10-306-18/+375
* Update to DAT 4403jeh2004-10-302-3/+3
* Update to DAT 4402jeh2004-10-292-3/+3
* Repair handling of ptys.cy2004-10-296-0/+129
* Introduce sudosh (sudo shell) into the Ports Tree.cy2004-10-2913-0/+100
* - Security Update to 0.56dinoex2004-10-282-3/+3
* Document rssh format string vulnerability.josef2004-10-281-0/+26
* - Update to 0.23pav2004-10-283-10/+10
* Update to DAT 4401jeh2004-10-282-3/+3
* Remove a DAT file that didn't completely download because it is not usefuljeh2004-10-281-11/+11
* Fix build on 4-stablevanilla2004-10-2718-3/+165
* Fix build on 4-stable.vanilla2004-10-276-3/+42
* Create a VuXML entry for Horde XSS help window vulnerability to replacenectar2004-10-272-1/+28
* - update to 1.0clsung2004-10-272-4/+4
* - Bugfix update to 0.9.7edinoex2004-10-276-59/+49
* Add an entry for a vulnerability fixed in horde-2.2.7.thierry2004-10-271-0/+1
* Chase libraries for new devel/libidn version.krion2004-10-262-2/+4
* Document a denial-of-service issue in bogofilter.nectar2004-10-261-0/+33
* Fix integer overflow vulnerabilities.nork2004-10-261-1/+4
* Document xpdf 2 and xpdf 3 vulnerabilities.nectar2004-10-261-0/+38
* Document several security issues in gaim, fixed in various versions fromnectar2004-10-261-5/+222
* Note that the Red Hat based linux_base ports containnectar2004-10-261-1/+2
* Braino: install the file with correct name.des2004-10-251-1/+4
* Clean up time for email addresses MIA!edwin2004-10-251-1/+1
* Add Auth_HTTP 2.0 from PEAR.des2004-10-254-0/+32
* Update to 2.1.20.ume2004-10-256-98/+91
* Document SSL_Cypherbypass vulnerability in mod_ssljosef2004-10-251-0/+71
* Add entries for vulnerabilites in imported xpdf code in kdegraphicslofi2004-10-241-0/+2
* fix unprev. IPv6 for FreeBSD 4oliver2004-10-242-3/+216
* - fix building problem and unbreak this portleeym2004-10-244-23/+27
* - Document more buffer overflows in mpg123.simon2004-10-241-0/+37
* I suck. (Correct a typo that would have been readily detected ifnectar2004-10-221-1/+1
* Add CVE name for cabextract issue.nectar2004-10-221-0/+2
* Fix a copy/paste typo in last commit.simon2004-10-221-1/+1
* Document DoS in Apache 2 SSL handling.simon2004-10-221-0/+37
* Mark deprecated due to no maintainer and unpatched denial-of-servicenectar2004-10-221-0/+3
* Note that xpm has been fixed.nectar2004-10-221-2/+8
* - bump PORTREVISION after update dependency.leeym2004-10-211-0/+1
* add procmail into dependency list.leeym2004-10-211-1/+2
* - Fix OPTIONS handlingpav2004-10-211-2/+2
* Update entry regarding INN 2.4.x buffer overflow:nectar2004-10-211-2/+3
* Document remote command execution vulnerability in phpMyAdmin.simon2004-10-211-0/+32
* - don't delete the virus database on deinstalldinoex2004-10-211-2/+2
* Update 1.3.4 --> 1.3.5cy2004-10-2120-196/+16
* Document insecure directory handling in cabextract.simon2004-10-211-0/+24
* - Update to 1.1 (final). For changes since 1.1-beta see the ChangeLogmarius2004-10-219-119/+159
* Chase the Gaim 1.0.2 upgrade.marcus2004-10-212-2/+2
* Update to DAT 4400jeh2004-10-212-3/+3
* Base if the last update was successful on the dontents of file_id.diz,jeh2004-10-211-2/+2
* Fix code so it is favored by both GCCs (2.x and 3.x), and unbreak the build.danfe2004-10-2012-4/+454
* - Update to 0.0.14pav2004-10-202-3/+3
* - Update to 0.0.18pav2004-10-203-8/+23
* - Update to 20041019sergei2004-10-202-3/+3
* Set correct entry date for the a2ps issue.simon2004-10-201-1/+1
* Document insecure command line argument handling in a2ps.simon2004-10-201-0/+41
* Document a vulnerability in ifmail. (There does not existnectar2004-10-201-0/+25
* - update to version 3.75eik2004-10-205-22/+7
* Document a vulnerability in imwheel.nectar2004-10-191-0/+35
* Add CVE names for FreeRADIUS vulnerabilities.nectar2004-10-191-1/+6
* Updated to 0.7askv2004-10-194-7/+7
* Document NTLM authentication vulnerability in squidjosef2004-10-191-0/+26
* Document a SQL command injection in Cacti.simon2004-10-191-0/+26
* - update to 0.80 releaseeik2004-10-182-3/+3
* Document a format string vulnerability in the apache13 mod_ssl proxysimon2004-10-181-0/+46
* - Change a few uses of <url> into <mlist>.simon2004-10-171-3/+3
* - Quick update to 0.0.8.1, bugfix release, because 0.0.8 was removedpav2004-10-174-6/+6
* - Update to 1.8.12 and unbreak on 5.xpav2004-10-162-8/+4
* Add clamassassinleeym2004-10-164-0/+46
* - Document remote DoS and loss of anonymity in Tor.simon2004-10-161-1/+35
* [1]:oliver2004-10-167-234/+154
* Update to 2.4.2.1krion2004-10-162-3/+3
* Kill off automake18, switching to automake19. Requiem Mors Pacem.ade2004-10-161-1/+2
* - Don't clobber portsentry.ignore on upgradepav2004-10-162-2/+4
* - pwauth must have a SUID bitclement2004-10-151-0/+1
* - Reduce dependency with perl-5.8.kuriyama2004-10-151-6/+11
* -Update to 2.1.3.mezz2004-10-1512-12/+565
* Update to 0.3.4.marcus2004-10-152-3/+3
* lesstif has been upgraded to a version that is not affected by thenectar2004-10-151-1/+1
* Recommit my changes from 1.298 which was accidently removed in 1.299.simon2004-10-151-2/+3
* Document two seperate security vulnerabilities injosef2004-10-151-3/+52
* Change the Xerces-C++ entry to match the xerces-c2 port.simon2004-10-151-2/+3
* Update to DAT 4399jeh2004-10-152-3/+3
* - bump PORTREVISIONclsung2004-10-142-1/+2
* - update to 0.80rc4eik2004-10-1411-147/+121
* Add security/pwauth 2.2.8,clement2004-10-147-0/+105
* Upgrade to 2.1.2.vanilla2004-10-143-15/+6
* Upgrade to 2.0.2vanilla2004-10-149-801/+144
* Upgrade to 2.0.2.vanilla2004-10-149-381/+351
* - drop maintainershipdinoex2004-10-143-3/+3
* - add a line why this port existdinoex2004-10-142-1/+3
* - update to 0.9.6clsung2004-10-145-26/+24
* Document vulnerability in freeradius.josef2004-10-141-0/+26
* - Document DoS in Xerces-C++.simon2004-10-141-1/+31
* It turns out that lesstif has libXpm sneakily embedded. There are atnectar2004-10-141-1/+5
* Document XSS in wordpress.simon2004-10-141-0/+24
* Document integer overflows in libtiff.nectar2004-10-141-0/+25
* - Document a CUPS local information disclosure.simon2004-10-141-0/+32
* Document a vulnerability in Zinf (freeamp).josef2004-10-141-0/+27
* Update to DAT 4398jeh2004-10-142-3/+3
* - Update to 20041012pav2004-10-142-3/+3
* - Update to 4.4.7pav2004-10-142-3/+3
* Document libtiff RLE decoder issues.nectar2004-10-141-0/+26
* Update to 1.33krion2004-10-132-3/+3
* - update to version 3.71-PRE1eik2004-10-132-8/+15
* Update to version 1.5markus2004-10-132-5/+5
* The sharutils buffer overflows has been fixed in sharutils 4.2.1_2.simon2004-10-131-1/+1
* - Update to 1.0.21sergei2004-10-132-9/+17
* Use libtool 15arved2004-10-131-1/+1
* Adjust patch.lofi2004-10-131-3/+3
* Update: security/samhain 1.8.10b -> 1.8.11edwin2004-10-132-8/+8
* - add USE_GCC=2.95 and unbreak this portleeym2004-10-131-4/+4
* Document a vulnerability in sharutils.simon2004-10-131-0/+31
* Document 2 DoS attacks possible againstjosef2004-10-131-0/+27
* - Update to 1.1.3leeym2004-10-134-15/+11
* ale@ reports that the only ports affected are php[45], php[45]-cgi,nectar2004-10-121-124/+2
* Note squid SNMP DoS. Based on an entry that wasnectar2004-10-121-0/+32
* add WITH_AUTHDAEMON option to allow use of courier authdaemond.ume2004-10-121-0/+4
* Update to version 0.3.6krion2004-10-124-22/+5
* Update to 4397jeh2004-10-122-3/+3
* Update to 1.4mat2004-10-122-3/+12
* Update to 1.1.8.linimon2004-10-122-3/+3
* - Upgrade to 2.2.0 [1]sergei2004-10-124-44/+45
* - Explicitly specify prefix for iconv and gettext librariessergei2004-10-122-3/+11
* Update to 1.1.7.linimon2004-10-122-3/+3
* Add an entry for a XSS vulnerability fixed in IMP-3.2.6.thierry2004-10-121-0/+1
* - new option WITH_OPENSSH_CHROOTdinoex2004-10-124-48/+124
* - cleanup patchesdinoex2004-10-1210-42/+42
* - add patch to support AES-192-CBC and AES-256-CBCdinoex2004-10-121-0/+210
* [MAINTAINER UPDATE] security/freebsd-updateedwin2004-10-122-0/+12