aboutsummaryrefslogtreecommitdiffstats
path: root/security
Commit message (Expand)AuthorAgeFilesLines
* Update to DAT 4628jeh2005-11-162-4/+4
* - Move securiy/hping -> net/hpingaz2005-11-157-126/+0
* Mass-conversion to the USE_AUTOTOOLS New World Order. The code presentade2005-11-1568-83/+69
* OKEN: Size mismatchkris2005-11-151-0/+2
* - Update to 0.4.6ahze2005-11-154-8/+8
* Now that bsdiff is part of the base system and conditional IGNORE=cperciva2005-11-151-2/+7
* Website movedache2005-11-152-3/+4
* Update to DAT 4627jeh2005-11-152-4/+4
* Update to DAT 4626jeh2005-11-152-3/+4
* libnet update:sem2005-11-1512-14/+39
* Add CVE name to an old sudo entry.simon2005-11-151-0/+2
* Take a perl@ hat and add SHA256 checksumsmat2005-11-1414-0/+14
* Be hipe and add SHA256mat2005-11-142-0/+2
* - Fix permission of 002.drweb-smf.sh start scriptgarga2005-11-141-1/+1
* Remove explicit checks for /usr/bin/bzip2.edwin2005-11-141-3/+0
* Update latest phpSysInfo entry to reflect that 2.4 was in fact not fixedsimon2005-11-141-1/+2
* Upgrade to 0.13mharo2005-11-142-4/+5
* Upgrade to 1.25mharo2005-11-142-3/+3
* Upgrade to 1.6.8.12mharo2005-11-142-5/+4
* Add SHA256ade2005-11-141-0/+1
* Reset undeliverable maintainer address (past 1 month):kris2005-11-141-2/+2
* Reset undeliverable maintainer address:kris2005-11-141-1/+1
* Update to 2.0.10mnag2005-11-149-9/+39
* Update to 2.0.10mnag2005-11-149-6/+18
* - Micromedia -> Macromediasem2005-11-141-6/+6
* - Document phpSysInfo vulnerabilitysem2005-11-141-0/+34
* - Document flashplugin vulnerabilitysem2005-11-141-0/+43
* Add SHA256mnag2005-11-141-0/+1
* Add SHA256mnag2005-11-141-0/+2
* Update to 20051112mnag2005-11-142-3/+5
* Update to 1.3.1mnag2005-11-143-4/+15
* Add amavisd-milter 1.0.2, milter for amavisd-new.lawrance2005-11-147-0/+107
* - add SHA checksumdinoex2005-11-133-2/+6
* - Update to 1.2pav2005-11-135-15/+43
* Move IDN related ports from devel to dns category:pav2005-11-132-2/+2
* - Install man pagesem2005-11-132-1/+7
* Sud is a daemon to execute interactive and non-interactive processes withpav2005-11-125-0/+62
* activate use of USE_SQLITE.ume2005-11-121-2/+1
* Update to 2.6.1mnag2005-11-122-9/+10
* add SHA256brooks2005-11-121-0/+1
* Add security/p5-Authen-Htpasswd 0.12, a Perl module to read and modifytobez2005-11-115-0/+56
* This port installs a 5.x binary, so depend on the compat5x port onarved2005-11-111-0/+4
* - Yield to a total SHAtification.sem2005-11-111-0/+1
* Add denyhosts 1.1.2, script to thwart ssh attacks.vanilla2005-11-118-0/+216
* Add SHA256 checksumlioux2005-11-113-0/+3
* Add CONFLICTS= ipsec-tools-[0-9]*.sumikawa2005-11-111-0/+2
* With portmgr hat on, reset maintainership of knu's ports since he haslinimon2005-11-119-9/+9
* - Add SHA256 to all ports submitter maintaingarga2005-11-113-0/+3
* - CATEGORY CHANGE: add "net" secondary categorygarga2005-11-1015-66/+93
* - Document p5-Mail-SpamAssassin vulnerabily (alread fixed in ports)sem2005-11-101-0/+66
* Update to 4.33mnag2005-11-106-362/+248
* Update to DAT 4624jeh2005-11-102-3/+3
* Update to DAT 4623jeh2005-11-102-3/+3
* - Respect non-standard LOCALBASEgarga2005-11-101-4/+3
* - Add SHA256garga2005-11-101-0/+1
* - Add SHA256 checksums.flz2005-11-091-0/+1
* Move instant messaging related ports to newly created net-im category:pav2005-11-094-10/+10
* Add SHA256mnag2005-11-093-0/+4
* Update to 4.33mnag2005-11-097-382/+217
* Fix order in rc script to prevent errorsmnag2005-11-093-7/+13
* Update to 2.2.6mnag2005-11-099-244/+96
* Fix FreeBSD-4.11 build problemcy2005-11-098-20/+60
* Fix LOCALBASE issue.skv2005-11-091-0/+1
* Update the recent gallery2 and webcalendar entries:remko2005-11-091-5/+14
* - use USB_BDB.ume2005-11-093-20/+10
* - Add SHA256garga2005-11-084-0/+5
* Add SHA256 checksums for my portsarved2005-11-082-0/+2
* Document qpopper -- multiple privilege escalation vulnerabilities.remko2005-11-081-0/+32
* Update to DAT 4622jeh2005-11-082-3/+3
* install missed components.html document.ume2005-11-072-3/+5
* - Update to 2.5ehaupt2005-11-073-9/+53
* - Update to 20051104garga2005-11-072-3/+3
* - Add missed </p> tag [1]sem2005-11-071-2/+3
* Update to DAT 4621jeh2005-11-062-3/+3
* Chase gpgme updateoliver2005-11-061-2/+2
* Update to 0.87.1mnag2005-11-053-20/+3
* Update to KDE 3.4.3 / KOffice 1.4.2lofi2005-11-052-4/+4
* Update gpgme to 1.0.3 and chase shared library version bump.lofi2005-11-057-114/+19
* Chase glib20 and libsoup shared library version.marcus2005-11-051-1/+7
* Bump PORTREVISION to chase the glib20 shared library update.marcus2005-11-0524-15/+24
* Presenting GNOME 2.12 for FreeBSD. The release is chock full of bug fixesmarcus2005-11-0518-136/+216
* Enables self-tests with WITH_JAILmnag2005-11-056-6/+192
* Change MAINTAINERship to perl@.nork2005-11-052-2/+2
* Add a bit more info from the PEAR advisory about the vulnerability tosimon2005-11-051-0/+4
* The two latest OpenVPN vulnerabilities were both only for 2.0 andsimon2005-11-051-2/+4
* Drop maintainerjesper2005-11-052-2/+2
* Add an entry for pear-PEAR arbitrary code execution vulnerability.thierry2005-11-051-0/+28
* Fix plist.sumikawa2005-11-042-1/+3
* - Update to 2.0.5garga2005-11-039-9/+66
* Update to 0.6.0mnag2005-11-033-13/+11
* Drop INSTALLS_SHLIB/LDCONFIG_DIRS: Local shlibs are dlopenedvs2005-11-031-2/+0
* Update to stunnel 4.14, which is mostly a bugfix release.roam2005-11-035-3/+39
* Update to DAT 4617jeh2005-11-032-3/+3
* make security/cyrus-sasl2-ldapdb buildable with OpenLDAP 2.3.ume2005-11-031-1/+10
* Correct skype entry to match the correct fixed port version number.simon2005-11-021-1/+2
* Upgrade to 20051102a.sumikawa2005-11-025-48/+18
* Update to 2.0.4mnag2005-11-029-78/+15
* Assign maintainership to original submitter of this port.linimon2005-11-021-1/+1
* Document two OpenVPN vulnerabilities.simon2005-11-021-0/+67
* As Peter Jeremy points out, the recent lynx vulnerability also concernsnaddy2005-11-021-0/+5
* Change maintainer's emailmnag2005-11-021-1/+1
* Update maintainer's emailmnag2005-11-022-4/+4
* - Update maintainer's email addresspav2005-11-022-4/+4
* Upgrade to latest version.vanilla2005-11-024-26/+4
* Fix fetchingarved2005-11-011-1/+1
* Add p5-Authen-SASL-Cyrus 0.12, XS SASL Authentication.skv2005-11-015-0/+51
* - Document skype vulnerabilitiessem2005-11-011-2/+75
* Update to 0.9.3lofi2005-11-012-3/+3
* - Document CVE-2005-3258:sem2005-11-011-0/+32
* Fix makeinfo problem under FreeBSD-6.0.cy2005-11-0112-40/+28
* Update to 4.13, which ought to fix the libc_r detection problem inroam2005-11-012-4/+5
* Makeinfo 4.8 problem.cy2005-11-014-16/+12
* - Update security/base to 1.2.1, which fixes a SQL injection issuesem2005-11-013-3/+4
* - Document a BASE Basic Analysis and Security Engine vulnerabilitysem2005-11-011-0/+29
* Let the IGNORE message make a bit more sense and change it from:erwin2005-11-012-2/+2
* Back out the accidentally committed white-space modification parts ofsimon2005-11-011-8900/+12898
* Update to DAT 4616jeh2005-11-012-3/+3
* - Update to 0.81garga2005-10-317-46/+93
* Add entry for "fetchmail -- fetchmailconf local password exposure",barner2005-10-311-0/+31
* Update to 20051030mnag2005-10-312-6/+6
* Update to 4.6.2mnag2005-10-313-6/+8
* Document lynx remote buffer overflow in NNTP header handling.naddy2005-10-311-12960/+8995
* Remove opensc-esteid. The functionality has been merged into thelinimon2005-10-315-111/+0
* - Update to 2.3.1clement2005-10-305-53/+35
* Relocate BROKEN conditional.cy2005-10-304-16/+16
* Fails to build on 4.11.cy2005-10-304-0/+8
* BROKEN on 7.0: Does not compilekris2005-10-291-1/+7
* Update to DAT 4615jeh2005-10-292-3/+3
* Reset maintainer, does not respond to mails for 19 days. Since a fewehaupt2005-10-291-1/+1
* - Unbreak: Update to 0.46agarga2005-10-292-5/+3
* chkproc sends a 25 signal to init causing a reboot after a 30s sleepgarga2005-10-281-0/+2
* BROKEN: Does not buildkris2005-10-284-0/+8
* - Fix a ruby vulnerabuility in the safe level settings.sem2005-10-281-0/+36
* Update to DAT 4614jeh2005-10-282-3/+3
* - Update to 0.46garga2005-10-272-3/+3
* - Fix WWW linegarga2005-10-271-3/+1
* Add an additional MASTER_SITE provided by maintainer to fix fetch.novel2005-10-271-1/+2
* Add more references to entry net-snmp -- remote DoS vulnerability.simon2005-10-271-0/+3
* Update to 0.6.2ehaupt2005-10-272-5/+4
* Make this port sysinstall friendly.cy2005-10-2712-57/+18
* Update to DAT 4613jeh2005-10-272-3/+3
* - Mark linux-firefox 1.0.7 as fixedsimon2005-10-261-5/+6
* Update to 5.2mnag2005-10-262-3/+3
* - Update to 1.3.7ehaupt2005-10-262-6/+18
* Add misc/compat5x to "openssl -- potential SSL 2.0 rollback".lesi2005-10-261-1/+8
* Cosmetic formatting change.cy2005-10-263-3/+3
* Adjust port to installl sudoers.conf.sample as a reference sample file.cy2005-10-2612-6/+84
* Update to 1.13skv2005-10-252-3/+3
* - fix build in jaildinoex2005-10-253-0/+6
* Fix broken port, capture missing file in pkg-plist.cy2005-10-256-6/+9
* Update to 4611jeh2005-10-252-3/+3
* Update to 0.2.10krion2005-10-242-3/+3
* Also mark xli as vulnerable to xloadimage -- buffer overflows in NIFFsimon2005-10-241-0/+5
* For entry libgadu -- multiple vulnerabilities:simon2005-10-241-2/+3
* - Update to 3.0.19ehaupt2005-10-232-8/+11
* New style bsd.java.mk.nork2005-10-231-1/+2
* For entry zope28 -- expose RestructuredText functionality to untrustedsimon2005-10-231-3/+5
* Add java_policy 1.4.2, which provides JCE(Java Cryptographynork2005-10-234-0/+55
* Update to liedentd 1.1, which is PREFIX-aware.wes2005-10-223-6/+4
* Add another reference to clamav -- arbitrary code execution and DoSsimon2005-10-221-0/+2
* - Mark the port IGNORE in addition to DEPRECATED: the port does not buildsergei2005-10-221-0/+1
* - Mark the port DEPRECATED with expiration in a month:sergei2005-10-211-0/+3
* Update to 4609jeh2005-10-212-3/+3
* Document x11/xloadimage buffer overflows in NIFF image title handling.naddy2005-10-201-0/+39
* - Fix build of openssl-beta on 6.0dinoex2005-10-201-1/+1
* Update to 1.1.0 release, add a couple of tunables to the Makefile,ade2005-10-203-7/+9
* update to dat 4608jeh2005-10-202-3/+3
* Rename all CAN-yyyy-nnnn to CVE-yyyy-nnnn, with the exception of textnectar2005-10-201-688/+688
* - Update to 0.6garga2005-10-192-5/+6
* . respect PREFIXehaupt2005-10-192-2/+6
* For entry: snort -- Back Orifice preprocessor buffer overflow vulnerability:simon2005-10-191-1/+2
* Make PREFIX-safelofi2005-10-191-3/+3
* - Document snort -- Back Orifice preprocessor buffer overflow vulnerability.simon2005-10-191-2/+50
* Update to 1.2.2arved2005-10-192-4/+3
* - Update to 2.4.3, which includes a fix for a potential buffer overflowsergei2005-10-192-6/+6
* - Update to 0.10garga2005-10-192-3/+3
* - Update to 0.9.0sergei2005-10-193-23/+48
* Update to 4607jeh2005-10-192-3/+3
* - Update to 0.9.0sergei2005-10-184-100/+29
* Update to 0.13.tobez2005-10-183-4/+5
* Update to 4606jeh2005-10-182-3/+3
* Add a check to see if WITH_MILTER is not set (and don't build milterlawrance2005-10-171-1/+1
* Add p5-GD-SecurityImage, a Perl5 module for creating CAPTCHA security imagesehaupt2005-10-175-0/+55
* Respect $PREFIXvs2005-10-161-0/+3
* Update to 0.2.9krion2005-10-163-7/+5
* Correct description.ade2005-10-161-1/+1
* - new option WITHOUT_OPENSSL_SSE2dinoex2005-10-161-0/+4
* - update stable to 0.9.7idinoex2005-10-164-32/+4
* - force 0.9.7 for FREEBSD 6.0 RELEASEdinoex2005-10-161-0/+8
* This now links dynamically to the dependencies since they now provide them.kris2005-10-151-3/+3
* - Document www/webcalendar vulnerability.sem2005-10-151-0/+23
* - Document www/gallery2 vulnerability.sem2005-10-151-0/+35
* Add security/libpreludedb:sergei2005-10-156-0/+149
* - Respect NOPORTDOCSsergei2005-10-153-10/+28
* Upgrade to DAT 4605jeh2005-10-152-3/+3
* - use new option namedinoex2005-10-141-1/+1
* Fix package list when use LIBUNRARmnag2005-10-143-40/+18
* - new option WITH_OPENSSL_STABLE=yesdinoex2005-10-141-10/+8
* - create slave port for openssl 0.9.7dinoex2005-10-142-0/+20
* - binary compatability patchdinoex2005-10-143-1/+29
* Update to DAT 4604jeh2005-10-142-3/+3
* - Update to 4.33ehaupt2005-10-139-289/+86
* Update to 0.03ehaupt2005-10-132-3/+3
* Remove pkg-message, the one in WRKDIR is used.edwin2005-10-132-6/+1
* New port: security/webfwlog Web-based firewall log analyzeredwin2005-10-137-0/+207
* Improve last couple of entries:simon2005-10-131-13/+17
* - Update to 1.2sem2005-10-133-3/+4
* BROKEN: Installs file outside of PREFIXkris2005-10-133-0/+6
* Update to DAT 4603jeh2005-10-132-3/+3
* Add entry for opensslmnag2005-10-121-3/+57
* Fix build on perl < 5.6skv2005-10-121-1/+8
* Add python as a secondary categorylioux2005-10-121-1/+1
* - update to 0.9.7g and 0.9.8adinoex2005-10-124-64/+8
* - Security Fix: CAN-2005-2969dinoex2005-10-123-2/+58
* Fix using of libunrar in OPTIONS variable.vsevolod2005-10-121-1/+1
* Fix a couple of problems on 64 bit platforms by importing 2.5:csjp2005-10-122-3/+3
* Add entry for phpmyadmin (PMASA-2005-4)mnag2005-10-121-0/+29
* Fix typo with range valuesmnag2005-10-121-1/+1
* Add entry from zope28mnag2005-10-121-0/+30
* Allow clamav to use rar 3 archives using archivers/libunrar.vsevolod2005-10-122-1/+3255
* - Update to 3.26.0 to fix fetching [1]erwin2005-10-123-12/+8
* Update to DAT 4602jeh2005-10-122-3/+3
* - Update to 0.6.6garga2005-10-125-36/+52
* - Update to 0.06 [1]erwin2005-10-122-10/+16
* Fix MASTER_SITE I botched in the previous commitvs2005-10-111-1/+1
* Update to DAT 4601jeh2005-10-112-3/+3
* Upgrade to 5.0edwin2005-10-114-29/+24
* Update to 0.6.2mnag2005-10-103-12/+21
* Update to DAT 4600jeh2005-10-102-3/+3
* Fix MASTER_SITES and use MAKE_ARGS instead of patch.vs2005-10-102-13/+2
* Reset bouncing maintainer address, remove stale mastersite.linimon2005-10-101-3/+2
* For libxine -- format string vulnerability entry:simon2005-10-101-5/+6
* Add gwee, a tool to exploit command execution vulnerabilities in web scripts.ehaupt2005-10-104-0/+42
* Add an entry for libxine format string vulnerability.nobutaka2005-10-101-0/+31
* Warren requested that this port be removed. I've just un-MAINTAINER-izedfenner2005-10-091-1/+1
* Mark older revisions linux_base-suse 9.3 as vulnerable to kdebase --simon2005-10-091-0/+5
* Remove WWW: None.fenner2005-10-091-1/+0
* - Fix handling of & sign, it need to be escaped for XML storagepav2005-10-093-1/+55
* - Set CONFLICTS with krb4 and krb5pav2005-10-091-2/+4
* - Set CONFLICTS with heimdal and krb5pav2005-10-091-2/+4
* - Set CONFLICTS with heimdal and krb4pav2005-10-094-4/+12
* - Fix pkg-plistlawrance2005-10-084-9/+12
* Update to 0.8.marcus2005-10-084-11/+11
* Update master sites.ehaupt2005-10-084-4/+0
* Update master sites.ehaupt2005-10-084-4/+0
* - Update to 2.4.1sergei2005-10-078-179/+58
* - Update to 0.9.0sergei2005-10-074-130/+124
* - Mark cfengine's arbitrary file overwriting vulnerability as fixed in 2.1.6_1sergei2005-10-071-0/+6
* Remove trailing backslash from MASTER_SITES which caused thefenner2005-10-071-2/+2
* Remove obsolete mastersites.linimon2005-10-071-6/+0