aboutsummaryrefslogtreecommitdiffstats
path: root/security
Commit message (Expand)AuthorAgeFilesLines
* Update to 0.0.16krion2004-08-023-6/+9
* * lcrzoex tools was renamed to netwoxsem2004-08-011-1/+0
* * lcrzo library was renamed to netwibsem2004-08-011-1/+0
* Correct a configure-misdetection which went unnoticed until now, but causeslofi2004-08-012-0/+8
* phpMyAdmin configuration manipulation and code injectioneik2004-07-311-1/+2
* Security fix.clement2004-07-313-15/+5
* - fix spellingdinoex2004-07-311-3/+1
* Register a vulnerability in mail/imp3.thierry2004-07-311-0/+1
* Mozilla Firefox certificate spoofingeik2004-07-301-0/+1
* Mozilla / Firefox user interface spoofing vulnerabilityeik2004-07-301-0/+42
* DansGuardian banned extension filter bypass vulnerabilityeik2004-07-301-0/+1
* Add clamsmtp 0.4, an ClamAV anti-virus SMTP Filter.vanilla2004-07-307-0/+115
* Remove pgp signature checking.lofi2004-07-302-22/+2
* Update to 1.26erwin2004-07-302-3/+3
* add a reference to the SoX buffer overflow entryeik2004-07-291-1/+1
* Update to 1.25erwin2004-07-292-3/+3
* SoX buffer overflows when handling .WAV fileseik2004-07-291-1/+2
* - Update to 0.75pav2004-07-292-4/+4
* Update to DAT 4382jeh2004-07-292-3/+3
* LCDProc buffer overflow/format string vulnerabilitieseik2004-07-281-0/+1
* . Add support for FreeBSD 4.10.glewis2004-07-281-0/+12
* Update to 20040727krion2004-07-282-4/+5
* Add p5-Crypt-SmbHash 0.02, Perl module implementing lanman and nt md4mat2004-07-275-0/+37
* Use & instead of naked &.des2004-07-271-1/+1
* Add CVE name and correct URL to iDEFENSE advisory for the SSLtelnet issue.des2004-07-271-1/+2
* pavuk digest auth buffer overfloweik2004-07-271-0/+1
* add Nessus "adduser" race condition and Dropbear DSS verification bugeik2004-07-271-2/+5
* Mark BROKEN: Runtime breakage exists.krion2004-07-271-0/+2
* Update to DAT 4381jeh2004-07-272-3/+3
* Remove references to mirror.ac.ukvs2004-07-261-2/+1
* Fix LDAP detection. For everybody who has a the defaultadamw2004-07-262-2/+2
* Add manipulate_data, a set of tools to search data on a harddrive/partition/f...pav2004-07-267-0/+68
* - Update to 1.1.3pav2004-07-267-26/+144
* - Update to 4.4.3pav2004-07-262-3/+3
* - Update to 20040725pav2004-07-262-3/+3
* -Update to 2.0.12.mezz2004-07-2510-47/+1575
* New option -r: restrict listed entries to selected references.eik2004-07-243-4/+25
* -Update to 2.1.1.mezz2004-07-249-15/+1038
* - Add the X_WINDOW_SYSTEM={xorg,xfree86-4,xfree86-3} variable to bsd.port.mk,anholt2004-07-241-4/+2
* Update to 0.6.4arved2004-07-244-8/+7
* Update to 4.31vs2004-07-235-59/+42
* - add some referenceseik2004-07-231-7/+20
* l2tpd BSS-based buffer overfloweik2004-07-231-0/+1
* Fix an XML tag.trhodes2004-07-221-1/+1
* Mark the 2.2.x series of Samba as vulnerable.trhodes2004-07-221-2/+5
* Recently announced Samba issue.trhodes2004-07-221-0/+26
* phpBB cross site scripting vulnerabilitieseik2004-07-221-0/+1
* Update to DAT 4380jeh2004-07-222-3/+3
* Fix building (well, make install) since a dependency didn't makeedwin2004-07-211-0/+1
* add subversion-perl, subversion-pythoneik2004-07-201-0/+1
* Fix WWW-tagvs2004-07-201-1/+1
* Revert to honoring PREFIX. No revision bump, cause it will be picked upjeh2004-07-201-1/+1
* subversion access control bypasseik2004-07-201-0/+1
* Undo yesterdays change after sysutils/porttools suddenly failed.edwin2004-07-203-7/+5
* Update to 2.28.marcus2004-07-206-10/+30
* Update to DAT 4379jeh2004-07-202-3/+3
* Fix to use update.ini, since readme.txt no longer has version information.jeh2004-07-201-2/+2
* Update to 20040719:vs2004-07-202-3/+3
* Add a new shared extension for PHP.ale2004-07-193-0/+29
* Add a new shared extension for PHP.ale2004-07-192-0/+15
* Add a new shared extension for PHP.ale2004-07-191-0/+1
* Add a new shared extension for PHP.ale2004-07-193-0/+29
* Add a new shared extension for PHP.ale2004-07-192-0/+15
* Add a new shared extension for PHP.ale2004-07-192-0/+15
* Add a new shared extension for PHP.ale2004-07-191-0/+1
* [PATCH] security/sudo: Utilize EXAMPLESDIRedwin2004-07-193-5/+7
* New port: devel/slb_rf60edwin2004-07-197-0/+107
* - update MASTER_SITESdinoex2004-07-191-2/+2
* - installs pkgconfig data in $(prefix)/libdatadinoex2004-07-193-7/+28
* update to autossh-1.2leeym2004-07-184-19/+4
* mod_ssl format string vulnerabilityeik2004-07-181-0/+2
* - update amavisd-new to 20040701vanilla2004-07-1810-61/+140
* Homepage has moved.sem2004-07-181-1/+1
* Update to 5.2krion2004-07-184-31/+36
* Add fcrackzip 0.3,krion2004-07-174-0/+46
* Update to 0.1.2krion2004-07-172-3/+3
* Do not run in debug-mode by default.anders2004-07-171-0/+4
* Add md5deep 1.3, program to compute MD5 and SHA1 message digestsmat2004-07-164-0/+38
* Roundup directory traversaleik2004-07-161-1/+2
* fix courier-imap version numbereik2004-07-161-1/+5
* PHP memory_limit and strip_tags() vulnerabilities.eik2004-07-151-0/+52
* Now that I've had a chance to test it, add sparc64 to the list of approvedcperciva2004-07-151-1/+1
* Update to DAT 4376jeh2004-07-152-3/+3
* Update to 2.1.19.ume2004-07-154-65/+19
* - Fix up categorypav2004-07-151-1/+1
* Add gnome-password-generator, a small GUI utility to generate random passwords.pav2004-07-145-0/+38
* wv library datetime field buffer overfloweik2004-07-141-0/+1
* multiple vulnerabilities in Bugzillaeik2004-07-141-0/+1
* check for a working tr(1).eik2004-07-141-0/+5
* drop maintainership, I don't use it any more and don't have time to fix itmat2004-07-131-1/+1
* Update to 1.6krion2004-07-132-8/+6
* - Update to 2.1.0pav2004-07-1312-47/+556
* - update to 0.49asem2004-07-124-30/+8
* correct vulnerable version of linux-png and add a referenceeik2004-07-111-2/+2
* Keep a local copy until the original mastersite is back again.edwin2004-07-112-2/+4
* libpng row buffer overfloweik2004-07-111-0/+2
* BROKEN: Unfetchablekris2004-07-111-0/+2
* etherealeik2004-07-111-1/+87
* Support WITHOUT_NLSkrion2004-07-112-2/+9
* Update MASTER_SITESlioux2004-07-101-1/+1
* Apply a big libtool patch to allow porters to use the libtool installed bymarcus2004-07-1022-22/+22
* Fix pidfile locationkrion2004-07-091-0/+1
* add some referenceseik2004-07-091-0/+4
* *******************IMPORTANT*******************jeh2004-07-092-3/+3
* Update to 2.2.5vs2004-07-092-3/+3
* - Update to 0.0.7.2vs2004-07-096-6/+18
* move e5e2883d-ceb9-11d8-8898-000d6111a684 to vuln.xmleik2004-07-082-2/+31
* Updating the Osiris integrity checker to 4.0.3. Many changes from thevs2004-07-085-12/+13
* Change email address for my ports.sem2004-07-081-1/+1
* Update to DAT 4374jeh2004-07-082-3/+3
* Use the new GConf handling policy, this will be required for GNOME 2.7/2.8 ormezz2004-07-081-16/+2
* - update to 3.55eik2004-07-077-75/+6
* Update to 1.21.tobez2004-07-072-3/+3
* - Mark IGNORE for nowpav2004-07-061-0/+2
* add some referenceseik2004-07-061-3/+3
* - Unbreak, unmark deprecatedpav2004-07-067-52/+142
* MySQL versions < 4.1 seem to be unaffectedeik2004-07-061-2/+2
* *******************IMPORTANT*******************jeh2004-07-062-3/+3
* XSS vulnerability affecting other webmail systemseik2004-07-061-0/+32
* Fix fetching.vs2004-07-061-3/+4
* add MySQL server authentication bypass / buffer overfloweik2004-07-061-0/+2
* Chase master-sitevs2004-07-062-6/+1
* - Update to 20040705vs2004-07-062-3/+3
* Add missing mandatory <body> element for SSLtelnet issue.nectar2004-07-061-2/+4
* Mark 4aec9d58-ce7b-11d8-858d-000d610a3b12 as a duplicate of theeik2004-07-053-1/+28
* Add an entry for the SSLtelnet format string vulnerability.des2004-07-051-4/+25
* update to 3.51-TEST4eik2004-07-053-3/+13
* - Update to 2.1.3 [1]sergei2004-07-056-28/+66
* Unbreak (fetching) and update security/clamav-devel to 20040701 snapshoteik2004-07-042-4/+3
* Update security/clamav to 0.74 releaseeik2004-07-042-3/+3
* Pavuk HTTP Location header overflownaddy2004-07-031-0/+28
* Update to 20040702krion2004-07-032-3/+3
* Move phpnuke vulnerabilities to VuXML.trhodes2004-07-032-1/+31
* Adjusted makefile for rdigest slave port.eik2004-07-031-13/+13
* *******************IMPORTANT*******************jeh2004-07-032-3/+3
* Add NetBSD rdigest fromeik2004-07-036-0/+421
* GNATS local privilege elevation (corrected PORTREVISION)eik2004-07-021-1/+1
* GNATS local privilege elevationeik2004-07-021-0/+32
* Whitespace cleanup.des2004-07-021-18/+18
* Add SA-04:13.linuxdes2004-07-021-0/+30
* Oinkmaster now lives at SouceForge.net, fix MASTER_SITES correspondinglyvs2004-07-021-1/+2
* Update to 0.04erwin2004-07-022-3/+3
* Make dependency on p5-Digest conditional on perl versionerwin2004-07-021-4/+8
* move "phpMyAdmin code injection" to vuxmleik2004-07-022-3/+9
* Test OSVERSION instead of pkg_info -P to enable cross-version buildseik2004-07-021-5/+2
* - Add phpMyAdmin 2.5.7 vulnerability.pav2004-07-021-0/+25
* phpMyAdmin code injectioneik2004-07-021-0/+1
* Autotools cleanup. Remove autoconf257 (259), automake17 (18), andade2004-07-021-1/+1
* Update to version 2.3.3krion2004-07-012-3/+3
* - update to version 0.5eik2004-07-0110-554/+442
* - SSLtelnet remote format string vulnerabilityeik2004-07-011-7/+8
* Update to DAT 4371jeh2004-07-012-3/+3
* Cleanup master-sites.vs2004-06-301-3/+2
* Update to 1.19erwin2004-06-302-3/+3
* Correct the location of the port providing the drwebd binary.adamw2004-06-291-1/+1
* add MIT Kerberos 5 krb5_aname_to_localname() buffer overfloweik2004-06-291-0/+1
* add isakmpd security association deletion vulnerabilityeik2004-06-291-2/+3
* As previously announced, remove drwebd. Its functionality is alreadylinimon2004-06-294-68/+0
* Change default status if no configuration is given from BROKEN to IGNORE.linimon2004-06-291-1/+1
* Correct a typo. CONFIGURE_ARGS should obviously be CONFIGURE_ENV here.marcus2004-06-292-2/+2
* Use the equal '=' sign as only the current version was affected.trhodes2004-06-291-1/+2
* add Apache input header folding DoS vulnerabilityeik2004-06-291-0/+1
* add a reference to ISC DHCP overflowseik2004-06-291-1/+2
* Add xorg-clients due to xdm socket vuln.trhodes2004-06-291-0/+28
* xine-lib RTSP handling vulnerabilitieseik2004-06-281-0/+1
* Update to version 0.1.1krion2004-06-284-5/+6
* Chase libraries for new devel/libidn versionkrion2004-06-282-2/+2
* Move MoinMoin entry to VuXML.trhodes2004-06-282-1/+24
* diversify url conversioneik2004-06-281-1/+21
* reference cleanupeik2004-06-281-42/+29
* Add p5-Digest-MD5-M4p 0.01,lth2004-06-275-0/+54
* Update to 2.27.marcus2004-06-274-12/+10
* - Update to 1.0pav2004-06-272-7/+11
* - Reset bouncing maintainer's address:pav2004-06-271-1/+1
* *******************IMPORTANT*******************jeh2004-06-262-3/+3
* New port pam_pGina version 1.1.3: Daemon for allowing a pGina pluginlioux2004-06-268-0/+112
* Fix the previous entry; it had an incorrect port range.trhodes2004-06-261-2/+2
* add portaudit2vuxml.pl to easy the migration of entries to VuXMLeik2004-06-261-0/+129
* Add an entry for recent isc-dhcp3-server buffer overflows.trhodes2004-06-262-1/+29
* Move giFT-FastTrack to VuXML.trhodes2004-06-262-1/+27
* giFT-FastTrack remote DoSeik2004-06-251-0/+1
* Update to 0.2.2eik2004-06-254-7/+10
* correct rlpr versioneik2004-06-251-2/+2
* Add dazuko 2.0.2, a common interface for 3rd party file access control.vs2004-06-257-0/+60
* Pure-FTPd DoS when the max number of connection is reachedeik2004-06-251-0/+1
* Update to version 20040624krion2004-06-252-3/+3
* Fix an older entry which ends with "buffer overflows vuxml".trhodes2004-06-251-2/+2
* Move the Gallery entry to VuXML.trhodes2004-06-252-1/+29
* update to version 0.4.1eik2004-06-253-2/+30
* www/sitecopy uses the included libneon version 0.24.0eik2004-06-251-2/+13
* Per distfile survey, chase mastersite.linimon2004-06-251-1/+2
* *******************IMPORTANT*******************jeh2004-06-252-3/+3
* rlpr local and remote exploitable buffer overflow (CAN-2004-0393, CAN-2004-0454)eik2004-06-241-0/+1
* Update to 0.6.3arved2004-06-243-4/+16
* Upgrade to 20040617a.sumikawa2004-06-244-6/+6
* CAN-2004-0451: format string vulnerabilities in supeik2004-06-241-0/+1
* Security flaw in rssheik2004-06-241-1/+2
* Icecast remote DoS vulnerabilityeik2004-06-241-0/+1
* Update to 4368jeh2004-06-242-3/+3
* Add pkg-req file which was forgotten in the last commit.eik2004-06-241-0/+27
* Update to version 0.4, with a new `-f' option.eik2004-06-243-42/+91
* it seems like isc-dhcp3-{client,devel} are unaffectedeik2004-06-231-1/+1
* reword gallery entryeik2004-06-231-1/+4
* Fix checksum, so unbreak and don't schedule this for removal.alex2004-06-232-6/+2
* Remove inclusion of Makefile.kde from all remaining ports not maintainedlofi2004-06-232-4/+16
* Sqwebmail 4.0.4 XSS vulnerabilityeik2004-06-221-0/+1
* I believe that linux-png-1.2.2 still contains the vulnerability.eik2004-06-221-1/+4
* Set an expiry date of 2004-08-20 for these BROKEN/IGNORE/FORBIDDENkris2004-06-222-0/+3
* - Extend png entry to cover it's linux-png variantpav2004-06-221-1/+5
* - Update to 1.8.9pav2004-06-222-3/+3
* Roundup remote file disclosure vulnerabilityeik2004-06-221-0/+1
* make expiry date customizable via daily_status_portaudit_expiryeik2004-06-223-3/+3
* mailman allows 3rd parties to retrieve member passwords (CAN-2004-0412)weik2004-06-211-0/+1
* super format string vulnerabilityeik2004-06-211-0/+1
* Scorched 3D server chat box format string vulnerabilityeik2004-06-211-0/+1
* BNBT Authorization Header DoSeik2004-06-211-0/+1
* s/BROKEN/IGNORE/ to prevent package buildkris2004-06-211-1/+1
* s/BROKEN/IGNORE/ to prevent package build on 4.xkris2004-06-211-1/+1
* Remove expired ports, plus the three ports that depended on them.kris2004-06-217-83/+0
* - The previous commit included ruby18-raspell-0.1, which is not affected.thierry2004-06-211-1/+2
* Security: fix a buffer overflow in word-list-compress:thierry2004-06-201-0/+1
* ircd-hybrid-7 low-bandwidth DoSeik2004-06-201-0/+2
* BROKEN on !i386: Does not compilekris2004-06-191-0/+4
* BROKEN on 5.x: Does not compilekris2004-06-191-0/+4
* BROKEN: Does not compile on FreeBSD >= 5.xkris2004-06-191-0/+4
* Update to 20040618krion2004-06-182-3/+3
* Update to 2.12erwin2004-06-182-3/+3
* Fetch the database from http://www.FreeBSD.org/ports/ first.eik2004-06-184-6/+11
* make BASEURL customizableeik2004-06-182-3/+11
* add subversion-perl, subversion-pythoneik2004-06-181-1/+1
* Update to 20040617krion2004-06-182-3/+3
* - update to 3.51-TEST3eik2004-06-175-4/+76
* BROKEN -> IGNORE, since this is a runtime error and the port itself buildsroam2004-06-171-1/+1
* Use DOCSDIR.roam2004-06-171-24/+24
* added racoon certificate validation bugeik2004-06-171-0/+1
* update to 0.2eik2004-06-173-8/+15
* add moinmoin, phpnuke and webmin vulnerabilitieseik2004-06-171-0/+3
* Update to DAT 4367jeh2004-06-172-3/+3
* Respect PREFIXkrion2004-06-161-4/+4
* SquirrelMail has a localized japanese versioneik2004-06-161-0/+1
* Add SquirrelMail XSS vulnerabilityeik2004-06-161-0/+1
* Update to 1.17erwin2004-06-162-3/+3
* Don't try to extract a signature file.lofi2004-06-151-0/+1
* update to 0.73eik2004-06-155-6/+11
* Midnight Commander security vulnerabilitiesfjoe2004-06-151-1/+2
* typoeik2004-06-152-2/+2
* Point all vulnerabilities to the base URL, so that entrieseik2004-06-152-3/+14
* *******************IMPORTANT*******************jeh2004-06-142-3/+3
* update to 0.1.1, supporting some of the VuXML 1.1 featureseik2004-06-146-53/+194
* reword some descriptionseik2004-06-141-6/+6