aboutsummaryrefslogtreecommitdiffstats
path: root/security
Commit message (Expand)AuthorAgeFilesLines
* Update to DAT 4379jeh2004-07-202-3/+3
* Fix to use update.ini, since readme.txt no longer has version information.jeh2004-07-201-2/+2
* Update to 20040719:vs2004-07-202-3/+3
* Add a new shared extension for PHP.ale2004-07-193-0/+29
* Add a new shared extension for PHP.ale2004-07-192-0/+15
* Add a new shared extension for PHP.ale2004-07-191-0/+1
* Add a new shared extension for PHP.ale2004-07-193-0/+29
* Add a new shared extension for PHP.ale2004-07-192-0/+15
* Add a new shared extension for PHP.ale2004-07-192-0/+15
* Add a new shared extension for PHP.ale2004-07-191-0/+1
* [PATCH] security/sudo: Utilize EXAMPLESDIRedwin2004-07-193-5/+7
* New port: devel/slb_rf60edwin2004-07-197-0/+107
* - update MASTER_SITESdinoex2004-07-191-2/+2
* - installs pkgconfig data in $(prefix)/libdatadinoex2004-07-193-7/+28
* update to autossh-1.2leeym2004-07-184-19/+4
* mod_ssl format string vulnerabilityeik2004-07-181-0/+2
* - update amavisd-new to 20040701vanilla2004-07-1810-61/+140
* Homepage has moved.sem2004-07-181-1/+1
* Update to 5.2krion2004-07-184-31/+36
* Add fcrackzip 0.3,krion2004-07-174-0/+46
* Update to 0.1.2krion2004-07-172-3/+3
* Do not run in debug-mode by default.anders2004-07-171-0/+4
* Add md5deep 1.3, program to compute MD5 and SHA1 message digestsmat2004-07-164-0/+38
* Roundup directory traversaleik2004-07-161-1/+2
* fix courier-imap version numbereik2004-07-161-1/+5
* PHP memory_limit and strip_tags() vulnerabilities.eik2004-07-151-0/+52
* Now that I've had a chance to test it, add sparc64 to the list of approvedcperciva2004-07-151-1/+1
* Update to DAT 4376jeh2004-07-152-3/+3
* Update to 2.1.19.ume2004-07-154-65/+19
* - Fix up categorypav2004-07-151-1/+1
* Add gnome-password-generator, a small GUI utility to generate random passwords.pav2004-07-145-0/+38
* wv library datetime field buffer overfloweik2004-07-141-0/+1
* multiple vulnerabilities in Bugzillaeik2004-07-141-0/+1
* check for a working tr(1).eik2004-07-141-0/+5
* drop maintainership, I don't use it any more and don't have time to fix itmat2004-07-131-1/+1
* Update to 1.6krion2004-07-132-8/+6
* - Update to 2.1.0pav2004-07-1312-47/+556
* - update to 0.49asem2004-07-124-30/+8
* correct vulnerable version of linux-png and add a referenceeik2004-07-111-2/+2
* Keep a local copy until the original mastersite is back again.edwin2004-07-112-2/+4
* libpng row buffer overfloweik2004-07-111-0/+2
* BROKEN: Unfetchablekris2004-07-111-0/+2
* etherealeik2004-07-111-1/+87
* Support WITHOUT_NLSkrion2004-07-112-2/+9
* Update MASTER_SITESlioux2004-07-101-1/+1
* Apply a big libtool patch to allow porters to use the libtool installed bymarcus2004-07-1022-22/+22
* Fix pidfile locationkrion2004-07-091-0/+1
* add some referenceseik2004-07-091-0/+4
* *******************IMPORTANT*******************jeh2004-07-092-3/+3
* Update to 2.2.5vs2004-07-092-3/+3
* - Update to 0.0.7.2vs2004-07-096-6/+18
* move e5e2883d-ceb9-11d8-8898-000d6111a684 to vuln.xmleik2004-07-082-2/+31
* Updating the Osiris integrity checker to 4.0.3. Many changes from thevs2004-07-085-12/+13
* Change email address for my ports.sem2004-07-081-1/+1
* Update to DAT 4374jeh2004-07-082-3/+3
* Use the new GConf handling policy, this will be required for GNOME 2.7/2.8 ormezz2004-07-081-16/+2
* - update to 3.55eik2004-07-077-75/+6
* Update to 1.21.tobez2004-07-072-3/+3
* - Mark IGNORE for nowpav2004-07-061-0/+2
* add some referenceseik2004-07-061-3/+3
* - Unbreak, unmark deprecatedpav2004-07-067-52/+142
* MySQL versions < 4.1 seem to be unaffectedeik2004-07-061-2/+2
* *******************IMPORTANT*******************jeh2004-07-062-3/+3
* XSS vulnerability affecting other webmail systemseik2004-07-061-0/+32
* Fix fetching.vs2004-07-061-3/+4
* add MySQL server authentication bypass / buffer overfloweik2004-07-061-0/+2
* Chase master-sitevs2004-07-062-6/+1
* - Update to 20040705vs2004-07-062-3/+3
* Add missing mandatory <body> element for SSLtelnet issue.nectar2004-07-061-2/+4
* Mark 4aec9d58-ce7b-11d8-858d-000d610a3b12 as a duplicate of theeik2004-07-053-1/+28
* Add an entry for the SSLtelnet format string vulnerability.des2004-07-051-4/+25
* update to 3.51-TEST4eik2004-07-053-3/+13
* - Update to 2.1.3 [1]sergei2004-07-056-28/+66
* Unbreak (fetching) and update security/clamav-devel to 20040701 snapshoteik2004-07-042-4/+3
* Update security/clamav to 0.74 releaseeik2004-07-042-3/+3
* Pavuk HTTP Location header overflownaddy2004-07-031-0/+28
* Update to 20040702krion2004-07-032-3/+3
* Move phpnuke vulnerabilities to VuXML.trhodes2004-07-032-1/+31
* Adjusted makefile for rdigest slave port.eik2004-07-031-13/+13
* *******************IMPORTANT*******************jeh2004-07-032-3/+3
* Add NetBSD rdigest fromeik2004-07-036-0/+421
* GNATS local privilege elevation (corrected PORTREVISION)eik2004-07-021-1/+1
* GNATS local privilege elevationeik2004-07-021-0/+32
* Whitespace cleanup.des2004-07-021-18/+18
* Add SA-04:13.linuxdes2004-07-021-0/+30
* Oinkmaster now lives at SouceForge.net, fix MASTER_SITES correspondinglyvs2004-07-021-1/+2
* Update to 0.04erwin2004-07-022-3/+3
* Make dependency on p5-Digest conditional on perl versionerwin2004-07-021-4/+8
* move "phpMyAdmin code injection" to vuxmleik2004-07-022-3/+9
* Test OSVERSION instead of pkg_info -P to enable cross-version buildseik2004-07-021-5/+2
* - Add phpMyAdmin 2.5.7 vulnerability.pav2004-07-021-0/+25
* phpMyAdmin code injectioneik2004-07-021-0/+1
* Autotools cleanup. Remove autoconf257 (259), automake17 (18), andade2004-07-021-1/+1
* Update to version 2.3.3krion2004-07-012-3/+3
* - update to version 0.5eik2004-07-0110-554/+442
* - SSLtelnet remote format string vulnerabilityeik2004-07-011-7/+8
* Update to DAT 4371jeh2004-07-012-3/+3
* Cleanup master-sites.vs2004-06-301-3/+2
* Update to 1.19erwin2004-06-302-3/+3
* Correct the location of the port providing the drwebd binary.adamw2004-06-291-1/+1
* add MIT Kerberos 5 krb5_aname_to_localname() buffer overfloweik2004-06-291-0/+1
* add isakmpd security association deletion vulnerabilityeik2004-06-291-2/+3
* As previously announced, remove drwebd. Its functionality is alreadylinimon2004-06-294-68/+0
* Change default status if no configuration is given from BROKEN to IGNORE.linimon2004-06-291-1/+1
* Correct a typo. CONFIGURE_ARGS should obviously be CONFIGURE_ENV here.marcus2004-06-292-2/+2
* Use the equal '=' sign as only the current version was affected.trhodes2004-06-291-1/+2
* add Apache input header folding DoS vulnerabilityeik2004-06-291-0/+1
* add a reference to ISC DHCP overflowseik2004-06-291-1/+2
* Add xorg-clients due to xdm socket vuln.trhodes2004-06-291-0/+28
* xine-lib RTSP handling vulnerabilitieseik2004-06-281-0/+1
* Update to version 0.1.1krion2004-06-284-5/+6
* Chase libraries for new devel/libidn versionkrion2004-06-282-2/+2
* Move MoinMoin entry to VuXML.trhodes2004-06-282-1/+24
* diversify url conversioneik2004-06-281-1/+21
* reference cleanupeik2004-06-281-42/+29
* Add p5-Digest-MD5-M4p 0.01,lth2004-06-275-0/+54
* Update to 2.27.marcus2004-06-274-12/+10
* - Update to 1.0pav2004-06-272-7/+11
* - Reset bouncing maintainer's address:pav2004-06-271-1/+1
* *******************IMPORTANT*******************jeh2004-06-262-3/+3
* New port pam_pGina version 1.1.3: Daemon for allowing a pGina pluginlioux2004-06-268-0/+112
* Fix the previous entry; it had an incorrect port range.trhodes2004-06-261-2/+2
* add portaudit2vuxml.pl to easy the migration of entries to VuXMLeik2004-06-261-0/+129
* Add an entry for recent isc-dhcp3-server buffer overflows.trhodes2004-06-262-1/+29
* Move giFT-FastTrack to VuXML.trhodes2004-06-262-1/+27
* giFT-FastTrack remote DoSeik2004-06-251-0/+1
* Update to 0.2.2eik2004-06-254-7/+10
* correct rlpr versioneik2004-06-251-2/+2
* Add dazuko 2.0.2, a common interface for 3rd party file access control.vs2004-06-257-0/+60
* Pure-FTPd DoS when the max number of connection is reachedeik2004-06-251-0/+1
* Update to version 20040624krion2004-06-252-3/+3
* Fix an older entry which ends with "buffer overflows vuxml".trhodes2004-06-251-2/+2
* Move the Gallery entry to VuXML.trhodes2004-06-252-1/+29
* update to version 0.4.1eik2004-06-253-2/+30
* www/sitecopy uses the included libneon version 0.24.0eik2004-06-251-2/+13
* Per distfile survey, chase mastersite.linimon2004-06-251-1/+2
* *******************IMPORTANT*******************jeh2004-06-252-3/+3
* rlpr local and remote exploitable buffer overflow (CAN-2004-0393, CAN-2004-0454)eik2004-06-241-0/+1
* Update to 0.6.3arved2004-06-243-4/+16
* Upgrade to 20040617a.sumikawa2004-06-244-6/+6
* CAN-2004-0451: format string vulnerabilities in supeik2004-06-241-0/+1
* Security flaw in rssheik2004-06-241-1/+2
* Icecast remote DoS vulnerabilityeik2004-06-241-0/+1
* Update to 4368jeh2004-06-242-3/+3
* Add pkg-req file which was forgotten in the last commit.eik2004-06-241-0/+27
* Update to version 0.4, with a new `-f' option.eik2004-06-243-42/+91
* it seems like isc-dhcp3-{client,devel} are unaffectedeik2004-06-231-1/+1
* reword gallery entryeik2004-06-231-1/+4
* Fix checksum, so unbreak and don't schedule this for removal.alex2004-06-232-6/+2
* Remove inclusion of Makefile.kde from all remaining ports not maintainedlofi2004-06-232-4/+16
* Sqwebmail 4.0.4 XSS vulnerabilityeik2004-06-221-0/+1
* I believe that linux-png-1.2.2 still contains the vulnerability.eik2004-06-221-1/+4
* Set an expiry date of 2004-08-20 for these BROKEN/IGNORE/FORBIDDENkris2004-06-222-0/+3
* - Extend png entry to cover it's linux-png variantpav2004-06-221-1/+5
* - Update to 1.8.9pav2004-06-222-3/+3
* Roundup remote file disclosure vulnerabilityeik2004-06-221-0/+1
* make expiry date customizable via daily_status_portaudit_expiryeik2004-06-223-3/+3
* mailman allows 3rd parties to retrieve member passwords (CAN-2004-0412)weik2004-06-211-0/+1
* super format string vulnerabilityeik2004-06-211-0/+1
* Scorched 3D server chat box format string vulnerabilityeik2004-06-211-0/+1
* BNBT Authorization Header DoSeik2004-06-211-0/+1
* s/BROKEN/IGNORE/ to prevent package buildkris2004-06-211-1/+1
* s/BROKEN/IGNORE/ to prevent package build on 4.xkris2004-06-211-1/+1
* Remove expired ports, plus the three ports that depended on them.kris2004-06-217-83/+0
* - The previous commit included ruby18-raspell-0.1, which is not affected.thierry2004-06-211-1/+2
* Security: fix a buffer overflow in word-list-compress:thierry2004-06-201-0/+1
* ircd-hybrid-7 low-bandwidth DoSeik2004-06-201-0/+2
* BROKEN on !i386: Does not compilekris2004-06-191-0/+4
* BROKEN on 5.x: Does not compilekris2004-06-191-0/+4
* BROKEN: Does not compile on FreeBSD >= 5.xkris2004-06-191-0/+4
* Update to 20040618krion2004-06-182-3/+3
* Update to 2.12erwin2004-06-182-3/+3
* Fetch the database from http://www.FreeBSD.org/ports/ first.eik2004-06-184-6/+11
* make BASEURL customizableeik2004-06-182-3/+11
* add subversion-perl, subversion-pythoneik2004-06-181-1/+1
* Update to 20040617krion2004-06-182-3/+3
* - update to 3.51-TEST3eik2004-06-175-4/+76
* BROKEN -> IGNORE, since this is a runtime error and the port itself buildsroam2004-06-171-1/+1
* Use DOCSDIR.roam2004-06-171-24/+24
* added racoon certificate validation bugeik2004-06-171-0/+1
* update to 0.2eik2004-06-173-8/+15
* add moinmoin, phpnuke and webmin vulnerabilitieseik2004-06-171-0/+3
* Update to DAT 4367jeh2004-06-172-3/+3
* Respect PREFIXkrion2004-06-161-4/+4
* SquirrelMail has a localized japanese versioneik2004-06-161-0/+1
* Add SquirrelMail XSS vulnerabilityeik2004-06-161-0/+1
* Update to 1.17erwin2004-06-162-3/+3
* Don't try to extract a signature file.lofi2004-06-151-0/+1
* update to 0.73eik2004-06-155-6/+11
* Midnight Commander security vulnerabilitiesfjoe2004-06-151-1/+2
* typoeik2004-06-152-2/+2
* Point all vulnerabilities to the base URL, so that entrieseik2004-06-152-3/+14
* *******************IMPORTANT*******************jeh2004-06-142-3/+3
* update to 0.1.1, supporting some of the VuXML 1.1 featureseik2004-06-146-53/+194
* reword some descriptionseik2004-06-141-6/+6
* Change URLs for a better reference about IMP & Chora vulnerabilities.thierry2004-06-131-2/+2
* Add an entry for Chora and IMP.thierry2004-06-131-0/+2
* Added CAN-2004-0488, CAN-2004-0492, DBMail vulnerability, smtpproxy vulnerabi...eik2004-06-131-4/+9
* Update to 1.16erwin2004-06-132-3/+3
* portaudit-db generates a portaudit database from a currenteik2004-06-1311-0/+645
* Add EXTRACT_ONLYarved2004-06-121-0/+1
* add a $FreeBSD$ tageik2004-06-121-0/+2
* Update KRB5 1.3.3 --> 1.3.4cy2004-06-1212-676/+12
* - Update to 20040610pav2004-06-124-5/+11
* correct the path to match the path where the HTML docs are installed.ume2004-06-122-4/+5
* Mark broken on -CURRENT until I figure out why stunnel doesn't likeroam2004-06-121-1/+7
* use `command_args' instead of overriding `flags'.ume2004-06-112-4/+3
* - Update to version 0.0.7krion2004-06-1110-94/+6
* Add ipfw2dshield, a script for parsing ipfw log messages and submitting reportspav2004-06-119-0/+126
* - Update to version 20040609krion2004-06-102-3/+3
* Add CAN-2004-0541 (buffer overflow in Squid NTLM authentication helper)des2004-06-101-0/+30
* Update to 4365erwin2004-06-102-3/+3
* Update to today's release. Propagate CPPFLAGS to CONFIGURE_ENV to enablemi2004-06-102-5/+5
* Update to version 3.2.3lofi2004-06-106-28/+6
* - Update to version 2.3.1krion2004-06-092-3/+3
* Fix for CAN-2004-0097eik2004-06-081-3/+3
* Update to 1.23mharo2004-06-082-3/+3
* Correction: FreeBSD-SA-04:12.jailroute does not apply to 4.7 and older.des2004-06-081-1/+1
* Whitespace cleanupdes2004-06-081-8/+8
* Add FreeBSD-SA-04:12.jailroute.des2004-06-081-0/+32
* Fix format string vulnerability.cy2004-06-072-1/+17
* - Really fix connection to clamdpav2004-06-071-2/+11
* Fix pkg-descr and COMMENT.thierry2004-06-072-2/+2
* Chase the gnutls shared lib version.marcus2004-06-061-1/+1
* - Update to 2.2.4pav2004-06-063-13/+3
* - Update to 1.0.13 (latest stable version) [1]sergei2004-06-053-12/+9
* - Update to 1.1.9 (latest development version)sergei2004-06-053-9/+7
* Sync with new bsd.autotools.mkade2004-06-054-3/+5
* - Update to 20040604pav2004-06-052-3/+3
* Updated patch for MITKRB5-SA-2004-001: krb5_aname_to_localname buffer overrun.cy2004-06-058-52/+60
* Update security/clamav to 0.72 releaseeik2004-06-043-9/+8
* Update ftp/curl to 7.12.0 and bump the shared library version in allroam2004-06-041-2/+2
* - Update to 20040603pav2004-06-042-5/+4
* Update to 0.70erwin2004-06-032-3/+3
* Update to 0.11erwin2004-06-032-3/+3
* And hot on the heels of the distsite update, here's the promised updateroam2004-06-033-12/+9
* Fix the distsites; an update to stunnel-4.05 is coming shortly, but still,roam2004-06-031-3/+2
* - Update to version 2.3.0krion2004-06-033-6/+6
* Update to DAT 4363jeh2004-06-032-3/+3
* Fix MITKRB5-SA-2004-001: buffer overflows in krb5_aname_to_localnamecy2004-06-038-4/+660
* Update to 2.26.marcus2004-06-014-8/+8
* Update to 2.10erwin2004-05-312-3/+3
* Update to 2.10erwin2004-05-312-3/+3
* - Update to version 1.15krion2004-05-312-3/+3
* - Convert rc script to rcng [1]pav2004-05-307-78/+144
* - Use fixed UID/GID (same as security/clamav)pav2004-05-301-2/+5
* - Use fixed UID/GIDpav2004-05-301-2/+4
* - Fix build on amd64krion2004-05-301-0/+13
* - Fix build on 4.xkrion2004-05-292-8/+22
* Add tor 0.0.6.2, an anonymizing overlay network for TCP.krion2004-05-2915-0/+173