aboutsummaryrefslogtreecommitdiffstats
path: root/security
Commit message (Expand)AuthorAgeFilesLines
* Document vulnerability in jabberd1josef2004-12-271-0/+24
* Update to 4.1.2krion2004-12-273-4/+5
* Update to 0.5.2.knu2004-12-262-3/+3
* Update to 1.5.2.knu2004-12-262-3/+3
* Remove deprecated USE_SIZElioux2004-12-251-1/+0
* s/kpdf/kdegraphicsjosef2004-12-251-1/+1
* Add ports to xpdf report that come with own xpdf in distfile.josef2004-12-241-0/+21
* Update to 0.0.9.1krion2004-12-246-8/+6
* Update to 0.24krion2004-12-242-3/+3
* Remove duplicate word in the latest squid entry.simon2004-12-231-1/+1
* - Update to 5.2.1clement2004-12-234-28/+8
* Clean up SQLite and related ports.nork2004-12-231-2/+2
* Attempt to make pam_alreadyloggedin work on 4.x again.green2004-12-232-4/+15
* Document potentially confusing results results on empty ACLsimon2004-12-231-0/+30
* Document multiple vulnerabilities in ethereal.simon2004-12-231-0/+49
* Document a buffer overflow vulnerability in xpdf.simon2004-12-231-0/+31
* Update to 1.9.14lofi2004-12-235-6/+21
* Update to 0.6.9lofi2004-12-234-16/+6
* Fix build on 4.X.marcus2004-12-232-0/+35
* Update to DAT 4416jeh2004-12-232-3/+3
* Document phpBB vulnerability that exists on phpBB < 2.0.11delphij2004-12-221-0/+34
* Fix ports: security/clamav and security/clamav-devel (change dbedwin2004-12-2212-30/+36
* Update to 0.7.5.marcus2004-12-226-63/+65
* Document a vulnerability in acroread.simon2004-12-221-0/+36
* Update port: security/pear-LiveUser to 0.14.0edwin2004-12-222-53/+35
* Document a vulnerability in ecartis.simon2004-12-221-0/+30
* Document multiple vulnerabilities in mplayer.simon2004-12-221-0/+40
* Fix pkg-plist.skv2004-12-214-6/+5
* - gpgme et gpgme03 are no longer in conflictclement2004-12-212-4/+0
* - Rework gpgme03 port to avoid conflict with gpgme 1.0clement2004-12-2111-14/+141
* Document a heap buffer overflow vulnerability in MIT Kerberos 5.simon2004-12-211-0/+37
* Update 1.3.5 --> 1.3.6cy2004-12-218-44/+40
* Document an integer overflow vulnerability in samba.simon2004-12-211-0/+40
* Crypto-publish.org no longer maintains a current release of MIT-KRB5.cy2004-12-218-60/+0
* - Move gpgme.h to ${PREFIX}/include/gpgme/ to make gpgme-1.x andclement2004-12-212-3/+5
* - Fix pkg-plist.sem2004-12-216-3/+6
* Corrected typo (blockquote in wrong place).niels2004-12-201-1/+1
* Update to version 0.0.21krion2004-12-202-9/+5
* Update the wording on IGNORE.linimon2004-12-201-1/+1
* s/BUILD_DEPEND/BUILD_DEPENDS/ and bump PORTREVISIONkris2004-12-201-1/+2
* This is the Metasploit Project.sem2004-12-205-0/+595
* - Update the corrected version number for recent phpMyAdmin entry to matchsimon2004-12-191-2/+4
* Add courier-authliboliver2004-12-1920-0/+956
* Switch from FORBIDDEN to IGNORE, since no security issue seems to be stated.linimon2004-12-191-1/+1
* This port is scheduled to be removed on 2005-02-18 if it is stillkris2004-12-193-0/+6
* Change dependency file to something gpgme03-specific.lofi2004-12-191-1/+1
* - sshd child process crashes when user with expired password logs in.pav2004-12-191-1/+1
* Updates for the latest PHP entry:simon2004-12-191-1/+4
* - Update to 0.6.7sem2004-12-193-5/+7
* - remove %D/%%SITE_PERL%%/%%PERL_ARCH%%/auto from pkg-plistleeym2004-12-191-1/+0
* PR: ports/71050niels2004-12-186-0/+73
* Properly NULL-terminate the array of command-line options.marcus2004-12-184-2/+26
* Fix some alignment errors with socket authentication which fixesmarcus2004-12-186-44/+160
* This file should never have been here.marcus2004-12-182-0/+0
* Correct recent php entry, 4.3.10 and 5.0.3 are fixed.simon2004-12-171-4/+4
* Update to 0.9.0lofi2004-12-174-5/+19
* Fix VID for the last commit.sem2004-12-171-1/+1
* Update to 1.26krion2004-12-172-3/+3
* Multiple vulnerabilities in PHP. From Secunia report.sem2004-12-171-0/+52
* Set LATEST_LINK to gpgme03lofi2004-12-171-0/+2
* - Update to 4.7vs2004-12-164-6/+15
* Update to 4.6, chase MASTER_SITEvs2004-12-164-18/+9
* Added 5 MySQL vulnerabilitiesniels2004-12-161-0/+177
* Clean up handling of locale directories at deinstall-time:kris2004-12-163-31/+0
* Document two vulnerabilities in phpMyAdmin.simon2004-12-161-0/+65
* Update to 0.2.3krion2004-12-164-5/+5
* Update to DAT 4415jeh2004-12-162-3/+3
* Create certificates on separate Makefile target.sem2004-12-164-14/+44
* Update to 20041213 snapshot.ale2004-12-153-25/+15
* Only depend on p5-IO for perl <5.6 (bump PORTREV)vs2004-12-151-2/+6
* Fix path to scanlogd in rc-script (bump PORTREV)vs2004-12-152-3/+3
* [MAINTAINER] security/f-prot-sig: update to 20041214edwin2004-12-152-3/+3
* Document multiple vulnerabilities in wget.simon2004-12-151-0/+44
* Update to 4414jeh2004-12-152-3/+3
* - Update to a new snapshot from the OpenBSD 2.6 branch dated 20041207simon2004-12-148-60/+83
* Change dependency to gpgme03.lofi2004-12-141-2/+2
* gpgme and gpgme03 are conflicting ports.lofi2004-12-142-0/+4
* Update to KDE 3.3.2lofi2004-12-144-8/+4
* - Grant maintainership to submitter of previous patch.sem2004-12-141-1/+1
* - Fix ipfw parser on FreeBSD 4.xsem2004-12-143-2/+22
* Updated to 1.10skv2004-12-133-7/+4
* Use RC_SUBR.krion2004-12-132-5/+38
* Clean up properly after ourselves now that bsd.port.mk allows it. Bumpkris2004-12-132-4/+18
* Add support for EAP. It might not work only in 802.1x mode, but shouldimp2004-12-134-0/+168
* Fix grammatical errorimp2004-12-131-1/+1
* Fix grammatical error Kris pointed out.imp2004-12-131-1/+1
* wpa_supplicant is only for current.imp2004-12-131-1/+7
* hostapd is only supported in -current.imp2004-12-131-1/+7
* WPA supplicant daemon for 802.11 networks.imp2004-12-136-0/+43
* Add hostapd, for software host 802.11 access points.imp2004-12-136-0/+42
* - Add bugtraqid references to several entries.simon2004-12-131-1/+12
* - Remove extra files on deinstallsem2004-12-134-13/+18
* Document security issue in Konqueror.josef2004-12-131-0/+26
* - Add patch to fix hashish with current version of cryptoppsem2004-12-132-2/+14
* Optionalize pth support.lofi2004-12-132-9/+20
* - Fix permission violation on ${PREFIX}/binclement2004-12-121-3/+2
* BROKEN on 4.x: Does not compilekris2004-12-121-0/+4
* BROKEN: Does not compilekris2004-12-121-7/+3
* Update to 1.1.0-3 which amongst several fixes and some minor new featuresmarius2004-12-129-28/+155
* Fix the self-tests instead of just omitting them.lofi2004-12-122-4/+17
* - Upgrade to nessus version 2.2.2asem2004-12-1210-15/+383
* Remove obsolete patch.lofi2004-12-121-27/+0
* - Upgrade to nessus version 2.2.2asem2004-12-1211-17/+387
* Document a NULL pointer dereference vulnerability in mod_access_referer.simon2004-12-121-0/+31
* Fix dependencies, enable pth-library, respect PTHREAD_LIBS,lofi2004-12-114-19/+482
* Switch to using gpgme03 until the maintainer approves the 0.7.5 update.marcus2004-12-111-1/+1
* Switch maintainer to ports@.marcus2004-12-111-1/+1
* Update to 1.0.1.marcus2004-12-117-52/+13
* Switch gpgme dependency to gpgme03.marcus2004-12-111-1/+1
* Add gpgme03 after a repocopy from ports/security/gpgme. Gpgme03 is the oldermarcus2004-12-111-0/+1
* Fix buildjesper2004-12-111-3/+3
* Update to 4413jeh2004-12-102-3/+3
* Chase OpenLDAP 2.2vs2004-12-091-4/+4
* Integrate the following vendor patches as published onsem2004-12-091-0/+27
* Update to 4412jeh2004-12-092-3/+3
* Document information leakage in viewcvs.simon2004-12-081-0/+25
* Document a symlink attack vulnerability in cscope.simon2004-12-071-0/+28
* Build and install *.pycsumikawa2004-12-072-1/+14
* Stop begging for donations in pkg-message. It doesn't work.cperciva2004-12-071-4/+0
* A command line idea encryption and decryption utility written bysem2004-12-076-0/+79
* Bump PORTREVISION for the previous committing.sumikawa2004-12-071-1/+1
* Make it executable with python-2.4.sumikawa2004-12-071-2/+5
* Upgrade to 2.0.4.vanilla2004-12-059-12/+36
* Upgrade to 2.0.4.vanilla2004-12-059-24/+33
* Bump PORTREVISION for previous commitjesper2004-12-051-0/+1
* Fix PLIST_FILES and PLIST_DIRSjesper2004-12-051-1/+3
* . Put the topic in the same format all other recent topics have been in forglewis2004-12-051-1/+6
* - update to 1.38clsung2004-12-052-3/+3
* Add cvename to bnc vulnerability.simon2004-12-051-0/+1
* Document a remote code execution vulnerability in bnc.simon2004-12-051-0/+34
* Chase the gaim-1.1.0 update.marcus2004-12-052-2/+2
* Fix grammar nit in ImageMagick entry.simon2004-12-051-1/+1
* For the Java plugin vulnerability, also match the linux-jdk packagesimon2004-12-051-1/+2
* Update to 1.9.13lofi2004-12-053-3/+4
* - Chase permanent redirectionpav2004-12-042-4/+2
* . Note that although linux-sun-jdk13 had one plugin vulnerability fixedglewis2004-12-041-1/+1
* Add ipv6 on CATEGORIES.sumikawa2004-12-032-2/+2
* Update to 0.9.10lofi2004-12-032-4/+4
* Update to 20041201 snapshot.ale2004-12-033-7/+28
* Document vulnerability that allows arbitrary command execution in rsshrushani2004-12-031-0/+33
* Document buffer overflows in rockdodger.naddy2004-12-031-0/+27
* - Add missed filesem2004-12-021-0/+20
* Add CVE to zip vulnerability.simon2004-12-021-0/+1
* Document a long path buffer overflow in zip.simon2004-12-021-0/+33
* update to 4411jeh2004-12-022-3/+3
* Document signal delivery vulnerability in sudoscript.simon2004-12-011-0/+23
* remove rubbish from the broken Makefileedwin2004-12-011-101/+0
* New port: security/pear-LiveUser PEAR user authentication andedwin2004-12-015-0/+217
* Document vulnerability in net/jabberd.josef2004-12-011-0/+27
* update to version 3.77eik2004-12-015-6/+6
* build & install two useful programs; testsaslauthd and saslcache.ume2004-12-012-1/+9
* Chase MASTER_SITESvs2004-11-301-1/+2
* Update to 1.6.8p5mharo2004-11-302-4/+4
* Fix build with native java.krion2004-11-301-0/+13
* Document vulnerability in net/opendchub.josef2004-11-301-0/+26
* - Teach configure about ia64 platform (similar to the recent amd64 fix)sergei2004-11-292-7/+8
* Update to 0.2.2krion2004-11-294-3/+8
* Add Bugtraq ID for SA-04:16.fetch entry.simon2004-11-291-0/+1
* remove needless definition.ume2004-11-282-10/+0
* cyrus-sasl2-saslauthd couldn't be built with system OpenSSL and BDB42.ume2004-11-282-2/+12
* - Update to 0.5sem2004-11-275-6/+28
* Update to 4.1.1krion2004-11-274-23/+15
* Update: security/osiris 4.0.5 -> 4.0.6edwin2004-11-273-12/+3
* New port: security/pear-Crypt_RC4 PEAR encryption class for RC4 encryptionedwin2004-11-274-0/+29
* Document two vulnerabilities in unarj.simon2004-11-271-0/+53
* . Mark linux-ibm-jdk as also vulnerable to the Java plugin vulnerability.glewis2004-11-261-0/+4
* Update to 0.6.8lofi2004-11-263-3/+13
* . Fix the range and add an additional range for the jdk vulnerability.glewis2004-11-261-1/+12
* . Fix whitespace.glewis2004-11-261-6/+6
* . Add an entry for the problem in the Java plugin.glewis2004-11-261-0/+31
* Update ruby CGI DoS entry to note that the most recent version insimon2004-11-251-2/+3
* Document vulnerability in ftp/prozilla.josef2004-11-251-0/+27
* - Update to 4.32.1sem2004-11-258-411/+322
* - Change Ocaml build dependency to a lighter lang/ocaml-nox11sergei2004-11-255-5/+48
* - Update to 4.32.2sem2004-11-257-172/+160
* Update to DAT 4410jeh2004-11-252-3/+3
* [MAINTAINER] security/f-prot: Make dependency on signatures optionaldaichi2004-11-251-3/+16
* Fix build with gssapi and krb5ume2004-11-252-2/+2
* correct fixed versionume2004-11-241-2/+2
* c0a269d5-3d16-11d9-8818-008088034841 andume2004-11-241-2/+6
* security/sudoscript to 2.1.2; fixes security bugdaichi2004-11-243-32/+31
* IGNORE: Changes the permissions on ${LOCALBASE}/binkris2004-11-241-0/+2
* - Standardize an EXPIRATION_DATE format.sem2004-11-241-1/+1
* BROKEN: Unfetchablekris2004-11-241-0/+2
* Maintainer no longer uses this software.linimon2004-11-241-1/+1
* Update to 0.3.2vs2004-11-234-39/+3
* Document that the twiki vulnerability is fixed in twiki-20040902.simon2004-11-231-1/+2
* add Cyrus IMAP Server multiple remote vulnerabilities.ume2004-11-231-0/+134
* Obfuscates email addresses.sem2004-11-236-0/+52
* Fixed memory leak.sumikawa2004-11-234-0/+86
* Update to version 0.0.20krion2004-11-232-3/+3
* I can't believe I had that link line backwards and I tested it. Anywaysjeh2004-11-221-2/+3
* Update to 0.0.15krion2004-11-222-3/+3
* Fix WWW: line.krion2004-11-221-1/+1
* Upgrade to version 4.40ejeh2004-11-223-25/+28
* - Update to 0.99pav2004-11-213-3/+5
* Add CVE reference for the SA-04:16.fetch entry.simon2004-11-211-0/+1
* - uvscan depends on libm.so.2jeh2004-11-212-8/+18
* Update to 20041119krion2004-11-212-3/+3
* Update to 4.4.8krion2004-11-212-3/+3
* With portmgr hat on, reset inactive maintainer. These ports are now uplinimon2004-11-201-1/+1
* Document vulnerability in phpmyadmin.josef2004-11-201-0/+25
* Update to DAT 4409jeh2004-11-192-3/+3
* Update to 0.2.1krion2004-11-192-3/+3
* Update to 2.4.3krion2004-11-192-3/+3
* Add localized versions of gd port to the VuXML entry.josef2004-11-191-0/+2
* - Update to 0.31 (see http://untroubled.org/cvm/NEWS for details)sergei2004-11-193-3/+12
* Document SA-04:16.fetch.simon2004-11-181-0/+36
* Update to 1.5mat2004-11-182-3/+3
* Update to DAT 4408jeh2004-11-182-3/+3
* Update to 0.3.1:vs2004-11-187-83/+185
* Fix build on 5.x.demon2004-11-182-3/+37
* Update to latest release of sudomharo2004-11-182-4/+4
* Add security/hpn-ssh, a high performance SSH based on OpenSSH, after abrooks2004-11-184-35/+31
* Update to DAT 4407jeh2004-11-182-3/+3
* Document the buffer overrun vulnerability in samba3josef2004-11-181-0/+27
* Correct range for xpdf vulnerability, as cups-base got a fixingjosef2004-11-181-1/+1
* Update to sudo-1.6.3p8, which *really* includes the CDPATH fix, androam2004-11-173-15/+5
* - Use "tail -F" rather than "tail -f".kuriyama2004-11-174-0/+61
* The last commit to japanese/samba also fixed the security issuejosef2004-11-171-1/+4
* Add CVE name to twiki entry.simon2004-11-171-0/+1
* Add teTeX-base to affected packages in xpdf's vuxml entry.josef2004-11-171-0/+4
* strip out CDPATHmharo2004-11-162-1/+11
* Document arbitrary shell command execution in twiki.simon2004-11-151-0/+33
* fix CAN-2004-0884.ume2004-11-152-1/+20
* Update to 20041114:vs2004-11-152-3/+3
* Document a format string vulnerability in proxytunnel.simon2004-11-151-0/+36
* - Update maintainer's email addresspav2004-11-1511-20/+20
* Correct URL to ddos_scan homepage.simon2004-11-151-1/+1
* - Update to 0.99sem2004-11-142-3/+3
* Update to version 0.0.19krion2004-11-143-5/+3
* Fix link issue under FreeBSD-4.X due to unsupported functions.cy2004-11-146-33/+69
* Update termlog from 2.0 to 2.2csjp2004-11-142-3/+3
* Fix entry date for the ruby entry from the last commit.simon2004-11-131-1/+1
* - Document at DoS in the Ruby CGI module.simon2004-11-131-0/+60
* Chase the Gaim 1.0.3 update.marcus2004-11-132-2/+2
* Update to 1.6.8p2mharo2004-11-132-4/+4
* Mention newly available pinentry-gtk2 in pkg-message.lofi2004-11-131-0/+1
* Add CVE name for gnats issue.nectar2004-11-121-1/+2
* Remove conditional runtime dependency on the gtar port, it's availablelofi2004-11-122-4/+0
* Note (likely) remotely exploitable vulnerability in samba 3.nectar2004-11-121-0/+33
* Document vulnerability in GNATS.josef2004-11-121-0/+24
* Document a XSS in squirrelmail.simon2004-11-121-0/+32
* Fix entry date.josef2004-11-121-1/+1
* Document BNC vulnerability.josef2004-11-121-0/+25
* Update to 1.0.3krion2004-11-122-4/+3
* - Reset bouncing maintainer's address:pav2004-11-121-1/+1
* Add spike-proxy, a professional-grade tool for looking for application-levelpav2004-11-126-0/+3346
* Update to 0.2.0krion2004-11-125-11/+59
* Note old hafiye bug.nectar2004-11-121-0/+36