aboutsummaryrefslogtreecommitdiffstats
path: root/security
Commit message (Expand)AuthorAgeFilesLines
* Change MAINTAINER to perl@.nork2004-08-138-8/+8
* - Add WITHOUT_NESSUS_GTK knob.vs2004-08-138-40/+88
* - Add WITHOUT_NESSUS_GTK knob.vs2004-08-138-40/+88
* Repair broken URL.nectar2004-08-131-1/+1
* Add another entry for kdelibs3 due to another missed patch.lofi2004-08-131-0/+1
* Correct entries for recent kde vuln's and add new entry for kdelibslofi2004-08-131-1/+3
* Add two issues covering three KDE advisories: two temporary filenectar2004-08-131-0/+67
* The last commit should have changed the comparison tag from <le> to <lt>.marcus2004-08-131-1/+1
* Update Gaim vulnerability (5b8f9a02-ec93-11d8-b913-000c41e2cdad) to indicatemarcus2004-08-131-1/+2
* The MSN component of Gaim contains remotely exploitable buffernectar2004-08-131-0/+25
* The Adobe Acrobat Reader can be coerced into executing arbitrarynectar2004-08-131-0/+36
* Under certain configurations of POPfile may allow an attacker tonectar2004-08-131-0/+25
* Correct version information syntax in a number of entries. VuXML-usingnectar2004-08-131-22/+40
* Doorman is a port knocking implementation which allows a server to runsem2004-08-136-0/+101
* give the ImageMagick png vulnerability an own entryeik2004-08-121-6/+28
* fix security hole in non-chroot rsync daemon.eik2004-08-121-0/+1
* 9fb5bb32-d6fa-11d8-b479-02e0185c0b53 is a duplicate of 40800696-c3b0-11d8-864...eik2004-08-122-2/+5
* - Update to 1.8.10bpav2004-08-122-48/+38
* f72ccf7c-e607-11d8-9b0a-000347a4fa7d is a duplicate of 6f955451-ba54-11d8-b88...eik2004-08-123-4/+13
* - Don't pretend we support anything older than perl 5.8.2. Support forsem2004-08-126-31/+30
* - Install additional documentationpav2004-08-122-7/+5
* Update to DAT 4385jeh2004-08-122-3/+3
* Upgrade to 3.1.1.kuriyama2004-08-123-7/+12
* Update to 0.21.nork2004-08-114-6/+5
* Update to 0.1.4krion2004-08-113-3/+19
* Update to 20040810vs2004-08-112-3/+3
* Factor out all but one of the build switches of the KDE main module portslofi2004-08-1111-350/+160
* add a reference for linux-png-1.0.x to 3a408f6f-9c52-11d8-9366-0020ed76ef5aeik2004-08-101-3/+4
* libine "vcd:" input source buffer overfloweik2004-08-101-0/+1
* Update to 0.6.5kevlo2004-08-102-3/+3
* Fix plist.kuriyama2004-08-102-1/+5
* SpamAssassin DoS & cfengine authentication heap corruptioneik2004-08-101-2/+4
* Update to DAT 4384jeh2004-08-102-3/+3
* add ImageMagick to the list of png-vulnerable portseik2004-08-091-1/+6
* Update to 0.98vs2004-08-094-45/+16
* - Update to 0.18vanilla2004-08-092-3/+3
* Add pft 1.2,krion2004-08-0922-0/+947
* Bump PORTREVISIONs to chase Gaim update.marcus2004-08-092-0/+2
* Update to version 0.0.17krion2004-08-092-4/+3
* Update to version 0.0.13krion2004-08-093-3/+7
* Upgrade to 1.1.4.thierry2004-08-095-48/+21
* respect CC/CFLAGS.sf2004-08-081-1/+5
* - Update to 0.75.1pav2004-08-082-3/+3
* CVStrac arbitrary remote code executioneik2004-08-071-1/+2
* correct typoeik2004-08-071-2/+2
* - Remove 2 patches no longer neededsergei2004-08-072-24/+0
* - Update to 2.5.5sergei2004-08-072-5/+5
* - Update to 0.2.10sergei2004-08-073-6/+8
* Add an entry for Thunderbird to the libpng vulnerability.marcus2004-08-071-0/+4
* - update to 2.0petef2004-08-063-9/+7
* fold entry 7eded4b8-e6fe-11d8-b12f-0a001f31891a into 2de14f7a-dad9-11d8-b59a-...eik2004-08-062-1/+4
* Update to 4.4.4vs2004-08-062-4/+4
* putty local command executiondinoex2004-08-061-0/+1
* Fix plist.lofi2004-08-061-2/+0
* move abe47a5a-e23c-11d8-9b0a-000347a4fa7d to vuxml, add mozilla to the list o...eik2004-08-062-1/+47
* o Security Update to 2.2.10-ja-1.0.nork2004-08-061-0/+1
* add Opera "location" object write access vulnerabilityeik2004-08-051-0/+1
* move f9e3e60b-e650-11d8-9b0a-000347a4fa7d to vuxml, add mozilla to the list o...eik2004-08-052-3/+93
* back out last commitdinoex2004-08-051-1/+0
* putty local command executiondinoex2004-08-051-0/+1
* - Upgrade to 0.3.5.kuriyama2004-08-054-23/+23
* Update to DAT 4383jeh2004-08-052-3/+3
* libPNG stack-based buffer overflow and other code concernseik2004-08-051-0/+3
* Update to 0.5.5lofi2004-08-043-11/+15
* Update to 1.9.10lofi2004-08-048-63/+23
* Update to 0.6.6lofi2004-08-045-33/+6
* Chase bumped libksba shared library versionlofi2004-08-042-2/+2
* Update to 0.9.7lofi2004-08-043-5/+5
* Acrobat Reader handling of malformed uuencoded pdf fileseik2004-08-041-0/+1
* Squid NTLM authentication helper overfloweik2004-08-041-0/+1
* ripMIME attachment extraction bypasseik2004-08-041-4/+5
* - Security update to 0.55dinoex2004-08-043-22/+22
* Update to 0.1.3krion2004-08-042-3/+3
* Link with openldap library only when WITH_LDAP knob is specifiedkuriyama2004-08-042-2/+6
* [MAINTAINER] security/clamsmtp: update to 0.5edwin2004-08-042-3/+3
* - Upgrade to 1.2.5.kuriyama2004-08-036-44/+18
* Fix LIB_DEPENDSkrion2004-08-032-22/+14
* Update to version 0.0.12krion2004-08-033-21/+8
* GnuTLS certificate chain verification DoSeik2004-08-031-1/+3
* Update to 0.0.16krion2004-08-023-6/+9
* * lcrzoex tools was renamed to netwoxsem2004-08-011-1/+0
* * lcrzo library was renamed to netwibsem2004-08-011-1/+0
* Correct a configure-misdetection which went unnoticed until now, but causeslofi2004-08-012-0/+8
* phpMyAdmin configuration manipulation and code injectioneik2004-07-311-1/+2
* Security fix.clement2004-07-313-15/+5
* - fix spellingdinoex2004-07-311-3/+1
* Register a vulnerability in mail/imp3.thierry2004-07-311-0/+1
* Mozilla Firefox certificate spoofingeik2004-07-301-0/+1
* Mozilla / Firefox user interface spoofing vulnerabilityeik2004-07-301-0/+42
* DansGuardian banned extension filter bypass vulnerabilityeik2004-07-301-0/+1
* Add clamsmtp 0.4, an ClamAV anti-virus SMTP Filter.vanilla2004-07-307-0/+115
* Remove pgp signature checking.lofi2004-07-302-22/+2
* Update to 1.26erwin2004-07-302-3/+3
* add a reference to the SoX buffer overflow entryeik2004-07-291-1/+1
* Update to 1.25erwin2004-07-292-3/+3
* SoX buffer overflows when handling .WAV fileseik2004-07-291-1/+2
* - Update to 0.75pav2004-07-292-4/+4
* Update to DAT 4382jeh2004-07-292-3/+3
* LCDProc buffer overflow/format string vulnerabilitieseik2004-07-281-0/+1
* . Add support for FreeBSD 4.10.glewis2004-07-281-0/+12
* Update to 20040727krion2004-07-282-4/+5
* Add p5-Crypt-SmbHash 0.02, Perl module implementing lanman and nt md4mat2004-07-275-0/+37
* Use &amp; instead of naked &.des2004-07-271-1/+1
* Add CVE name and correct URL to iDEFENSE advisory for the SSLtelnet issue.des2004-07-271-1/+2
* pavuk digest auth buffer overfloweik2004-07-271-0/+1
* add Nessus "adduser" race condition and Dropbear DSS verification bugeik2004-07-271-2/+5
* Mark BROKEN: Runtime breakage exists.krion2004-07-271-0/+2
* Update to DAT 4381jeh2004-07-272-3/+3
* Remove references to mirror.ac.ukvs2004-07-261-2/+1
* Fix LDAP detection. For everybody who has a the defaultadamw2004-07-262-2/+2
* Add manipulate_data, a set of tools to search data on a harddrive/partition/f...pav2004-07-267-0/+68
* - Update to 1.1.3pav2004-07-267-26/+144
* - Update to 4.4.3pav2004-07-262-3/+3
* - Update to 20040725pav2004-07-262-3/+3
* -Update to 2.0.12.mezz2004-07-2510-47/+1575
* New option -r: restrict listed entries to selected references.eik2004-07-243-4/+25
* -Update to 2.1.1.mezz2004-07-249-15/+1038
* - Add the X_WINDOW_SYSTEM={xorg,xfree86-4,xfree86-3} variable to bsd.port.mk,anholt2004-07-241-4/+2
* Update to 0.6.4arved2004-07-244-8/+7
* Update to 4.31vs2004-07-235-59/+42
* - add some referenceseik2004-07-231-7/+20
* l2tpd BSS-based buffer overfloweik2004-07-231-0/+1
* Fix an XML tag.trhodes2004-07-221-1/+1
* Mark the 2.2.x series of Samba as vulnerable.trhodes2004-07-221-2/+5
* Recently announced Samba issue.trhodes2004-07-221-0/+26
* phpBB cross site scripting vulnerabilitieseik2004-07-221-0/+1
* Update to DAT 4380jeh2004-07-222-3/+3
* Fix building (well, make install) since a dependency didn't makeedwin2004-07-211-0/+1
* add subversion-perl, subversion-pythoneik2004-07-201-0/+1
* Fix WWW-tagvs2004-07-201-1/+1
* Revert to honoring PREFIX. No revision bump, cause it will be picked upjeh2004-07-201-1/+1
* subversion access control bypasseik2004-07-201-0/+1
* Undo yesterdays change after sysutils/porttools suddenly failed.edwin2004-07-203-7/+5
* Update to 2.28.marcus2004-07-206-10/+30
* Update to DAT 4379jeh2004-07-202-3/+3
* Fix to use update.ini, since readme.txt no longer has version information.jeh2004-07-201-2/+2
* Update to 20040719:vs2004-07-202-3/+3
* Add a new shared extension for PHP.ale2004-07-193-0/+29
* Add a new shared extension for PHP.ale2004-07-192-0/+15
* Add a new shared extension for PHP.ale2004-07-191-0/+1
* Add a new shared extension for PHP.ale2004-07-193-0/+29
* Add a new shared extension for PHP.ale2004-07-192-0/+15
* Add a new shared extension for PHP.ale2004-07-192-0/+15
* Add a new shared extension for PHP.ale2004-07-191-0/+1
* [PATCH] security/sudo: Utilize EXAMPLESDIRedwin2004-07-193-5/+7
* New port: devel/slb_rf60edwin2004-07-197-0/+107
* - update MASTER_SITESdinoex2004-07-191-2/+2
* - installs pkgconfig data in $(prefix)/libdatadinoex2004-07-193-7/+28
* update to autossh-1.2leeym2004-07-184-19/+4
* mod_ssl format string vulnerabilityeik2004-07-181-0/+2
* - update amavisd-new to 20040701vanilla2004-07-1810-61/+140
* Homepage has moved.sem2004-07-181-1/+1
* Update to 5.2krion2004-07-184-31/+36
* Add fcrackzip 0.3,krion2004-07-174-0/+46
* Update to 0.1.2krion2004-07-172-3/+3
* Do not run in debug-mode by default.anders2004-07-171-0/+4
* Add md5deep 1.3, program to compute MD5 and SHA1 message digestsmat2004-07-164-0/+38
* Roundup directory traversaleik2004-07-161-1/+2
* fix courier-imap version numbereik2004-07-161-1/+5
* PHP memory_limit and strip_tags() vulnerabilities.eik2004-07-151-0/+52
* Now that I've had a chance to test it, add sparc64 to the list of approvedcperciva2004-07-151-1/+1
* Update to DAT 4376jeh2004-07-152-3/+3
* Update to 2.1.19.ume2004-07-154-65/+19
* - Fix up categorypav2004-07-151-1/+1
* Add gnome-password-generator, a small GUI utility to generate random passwords.pav2004-07-145-0/+38
* wv library datetime field buffer overfloweik2004-07-141-0/+1
* multiple vulnerabilities in Bugzillaeik2004-07-141-0/+1
* check for a working tr(1).eik2004-07-141-0/+5
* drop maintainership, I don't use it any more and don't have time to fix itmat2004-07-131-1/+1
* Update to 1.6krion2004-07-132-8/+6
* - Update to 2.1.0pav2004-07-1312-47/+556
* - update to 0.49asem2004-07-124-30/+8
* correct vulnerable version of linux-png and add a referenceeik2004-07-111-2/+2
* Keep a local copy until the original mastersite is back again.edwin2004-07-112-2/+4
* libpng row buffer overfloweik2004-07-111-0/+2
* BROKEN: Unfetchablekris2004-07-111-0/+2
* etherealeik2004-07-111-1/+87
* Support WITHOUT_NLSkrion2004-07-112-2/+9
* Update MASTER_SITESlioux2004-07-101-1/+1
* Apply a big libtool patch to allow porters to use the libtool installed bymarcus2004-07-1022-22/+22
* Fix pidfile locationkrion2004-07-091-0/+1
* add some referenceseik2004-07-091-0/+4
* *******************IMPORTANT*******************jeh2004-07-092-3/+3
* Update to 2.2.5vs2004-07-092-3/+3
* - Update to 0.0.7.2vs2004-07-096-6/+18
* move e5e2883d-ceb9-11d8-8898-000d6111a684 to vuln.xmleik2004-07-082-2/+31
* Updating the Osiris integrity checker to 4.0.3. Many changes from thevs2004-07-085-12/+13
* Change email address for my ports.sem2004-07-081-1/+1
* Update to DAT 4374jeh2004-07-082-3/+3
* Use the new GConf handling policy, this will be required for GNOME 2.7/2.8 ormezz2004-07-081-16/+2
* - update to 3.55eik2004-07-077-75/+6
* Update to 1.21.tobez2004-07-072-3/+3
* - Mark IGNORE for nowpav2004-07-061-0/+2
* add some referenceseik2004-07-061-3/+3
* - Unbreak, unmark deprecatedpav2004-07-067-52/+142
* MySQL versions < 4.1 seem to be unaffectedeik2004-07-061-2/+2
* *******************IMPORTANT*******************jeh2004-07-062-3/+3
* XSS vulnerability affecting other webmail systemseik2004-07-061-0/+32
* Fix fetching.vs2004-07-061-3/+4
* add MySQL server authentication bypass / buffer overfloweik2004-07-061-0/+2
* Chase master-sitevs2004-07-062-6/+1
* - Update to 20040705vs2004-07-062-3/+3
* Add missing mandatory <body> element for SSLtelnet issue.nectar2004-07-061-2/+4
* Mark 4aec9d58-ce7b-11d8-858d-000d610a3b12 as a duplicate of theeik2004-07-053-1/+28
* Add an entry for the SSLtelnet format string vulnerability.des2004-07-051-4/+25
* update to 3.51-TEST4eik2004-07-053-3/+13
* - Update to 2.1.3 [1]sergei2004-07-056-28/+66
* Unbreak (fetching) and update security/clamav-devel to 20040701 snapshoteik2004-07-042-4/+3
* Update security/clamav to 0.74 releaseeik2004-07-042-3/+3
* Pavuk HTTP Location header overflownaddy2004-07-031-0/+28
* Update to 20040702krion2004-07-032-3/+3
* Move phpnuke vulnerabilities to VuXML.trhodes2004-07-032-1/+31
* Adjusted makefile for rdigest slave port.eik2004-07-031-13/+13
* *******************IMPORTANT*******************jeh2004-07-032-3/+3
* Add NetBSD rdigest fromeik2004-07-036-0/+421
* GNATS local privilege elevation (corrected PORTREVISION)eik2004-07-021-1/+1
* GNATS local privilege elevationeik2004-07-021-0/+32
* Whitespace cleanup.des2004-07-021-18/+18
* Add SA-04:13.linuxdes2004-07-021-0/+30
* Oinkmaster now lives at SouceForge.net, fix MASTER_SITES correspondinglyvs2004-07-021-1/+2
* Update to 0.04erwin2004-07-022-3/+3
* Make dependency on p5-Digest conditional on perl versionerwin2004-07-021-4/+8
* move "phpMyAdmin code injection" to vuxmleik2004-07-022-3/+9
* Test OSVERSION instead of pkg_info -P to enable cross-version buildseik2004-07-021-5/+2
* - Add phpMyAdmin 2.5.7 vulnerability.pav2004-07-021-0/+25
* phpMyAdmin code injectioneik2004-07-021-0/+1
* Autotools cleanup. Remove autoconf257 (259), automake17 (18), andade2004-07-021-1/+1
* Update to version 2.3.3krion2004-07-012-3/+3
* - update to version 0.5eik2004-07-0110-554/+442
* - SSLtelnet remote format string vulnerabilityeik2004-07-011-7/+8
* Update to DAT 4371jeh2004-07-012-3/+3
* Cleanup master-sites.vs2004-06-301-3/+2
* Update to 1.19erwin2004-06-302-3/+3
* Correct the location of the port providing the drwebd binary.adamw2004-06-291-1/+1
* add MIT Kerberos 5 krb5_aname_to_localname() buffer overfloweik2004-06-291-0/+1
* add isakmpd security association deletion vulnerabilityeik2004-06-291-2/+3
* As previously announced, remove drwebd. Its functionality is alreadylinimon2004-06-294-68/+0
* Change default status if no configuration is given from BROKEN to IGNORE.linimon2004-06-291-1/+1
* Correct a typo. CONFIGURE_ARGS should obviously be CONFIGURE_ENV here.marcus2004-06-292-2/+2
* Use the equal '=' sign as only the current version was affected.trhodes2004-06-291-1/+2
* add Apache input header folding DoS vulnerabilityeik2004-06-291-0/+1
* add a reference to ISC DHCP overflowseik2004-06-291-1/+2
* Add xorg-clients due to xdm socket vuln.trhodes2004-06-291-0/+28
* xine-lib RTSP handling vulnerabilitieseik2004-06-281-0/+1
* Update to version 0.1.1krion2004-06-284-5/+6
* Chase libraries for new devel/libidn versionkrion2004-06-282-2/+2
* Move MoinMoin entry to VuXML.trhodes2004-06-282-1/+24
* diversify url conversioneik2004-06-281-1/+21
* reference cleanupeik2004-06-281-42/+29
* Add p5-Digest-MD5-M4p 0.01,lth2004-06-275-0/+54