aboutsummaryrefslogtreecommitdiffstats
path: root/security
Commit message (Expand)AuthorAgeFilesLines
* - Add SHA256pav2005-11-277-0/+7
* - Add CAcert.org certificatespav2005-11-262-2/+277
* Standarize the horde -- Cross site scripting vulnerabilities in MIMEremko2005-11-261-10/+16
* Add security/tor-develedwin2005-11-261-0/+1
* New Port: security/tor-develedwin2005-11-265-34/+37
* - Kill pseudo-empty distinfo filespav2005-11-261-1/+0
* - Style: ports@freebsd.org -> ports@FreeBSD.orgpav2005-11-261-1/+1
* Improve runtime performance on Sparc 64 platform.cy2005-11-268-44/+52
* - Update to 1.1.2pav2005-11-265-5/+25
* Update to DAT 4637jeh2005-11-262-4/+4
* - Add SHA256pav2005-11-26122-2/+131
* - warn users of option OPENSSL_OVERWRITE_BASEdinoex2005-11-251-0/+10
* - Add SHA256 checksums to my portssergei2005-11-258-0/+14
* Chase URLs per distfile survey.linimon2005-11-2515-15/+15
* [NEW PORT] security/jailaudit: Generate portaudit reports for jails from the ...edwin2005-11-255-0/+68
* New port: security/klamavedwin2005-11-255-0/+114
* security/nettle is out of date : port version is 1.7, available is 1.13edwin2005-11-2412-108/+82
* - Fix typo in Makefile (s/aendmail/sendmail/)az2005-11-241-1/+1
* Update to 20051123.dannyboy2005-11-242-5/+5
* - Add SHA256 checksumspav2005-11-244-0/+4
* Fix the Sparc 64 build.cy2005-11-244-12/+20
* - Add SHA256pav2005-11-241-0/+1
* - Fix dependency on prelude (shlib version has been bumped recently).flz2005-11-231-1/+1
* - Fix permissions of directory for default configuration files.flz2005-11-232-1/+2
* New port md4coll version 0.1: Fast MD4 collision generatorlioux2005-11-235-0/+56
* New port md5coll version 0.1: Fast MD5 collision generatorlioux2005-11-235-0/+56
* - Update to 4.33pav2005-11-236-317/+245
* - Fix message templates in default configuration filepav2005-11-232-2/+80
* Flag Sparc64 build as broken.cy2005-11-234-0/+12
* Add an entry for cross site scripting vulnerabilities in Horde's MIMEthierry2005-11-231-0/+34
* Update to DAT 4634jeh2005-11-232-4/+4
* Fix build in 4.xmnag2005-11-222-1/+3
* [patch] security/drweb-postfix have invalid default configedwin2005-11-222-0/+80
* replace master for lcsrc.zipedwin2005-11-222-1/+3
* - Update to 0.6.3. It fixes some crashes,sem2005-11-222-3/+4
* Update to DAT 4633jeh2005-11-222-4/+4
* - Update to 1.9.2pav2005-11-213-7/+13
* - Remove security/prelude-nids and refer users to security/snort instead:sergei2005-11-217-166/+0
* - Disconnect security/prelude-nids from the parent Makefilesergei2005-11-211-1/+0
* - update to 0.50clsung2005-11-212-5/+6
* BROKEN: Unfetchablekris2005-11-211-0/+2
* - update default build options on aplhadinoex2005-11-191-1/+1
* - backout last patchdinoex2005-11-191-40/+26
* - update default build options on aplhadinoex2005-11-191-26/+40
* Switch to <target>:: convention for both patch-autotools and run-autotools,ade2005-11-191-1/+1
* Update to DAT 4631jeh2005-11-192-4/+4
* Update to 0.12mnag2005-11-182-3/+5
* Racoon is now maintained in security/ipsec-tools.sumikawa2005-11-1811-205/+0
* Update 1.4.2 --> 1.4.3cy2005-11-188-16/+12
* Update to DAT 4631jeh2005-11-182-4/+4
* - Update to 1.0.3pav2005-11-184-25/+18
* - Update MASTER_SITESpav2005-11-186-32/+36
* - update to 1.4.9clsung2005-11-173-5/+10
* Update to DAT 4630jeh2005-11-172-4/+4
* Update to DAT 4629jeh2005-11-172-4/+4
* phpmyadmin -- HTTP Response Splitting vulnerabilitymnag2005-11-161-0/+32
* Update to DAT 4628jeh2005-11-162-4/+4
* - Move securiy/hping -> net/hpingaz2005-11-157-126/+0
* Mass-conversion to the USE_AUTOTOOLS New World Order. The code presentade2005-11-1568-83/+69
* OKEN: Size mismatchkris2005-11-151-0/+2
* - Update to 0.4.6ahze2005-11-154-8/+8
* Now that bsdiff is part of the base system and conditional IGNORE=cperciva2005-11-151-2/+7
* Website movedache2005-11-152-3/+4
* Update to DAT 4627jeh2005-11-152-4/+4
* Update to DAT 4626jeh2005-11-152-3/+4
* libnet update:sem2005-11-1512-14/+39
* Add CVE name to an old sudo entry.simon2005-11-151-0/+2
* Take a perl@ hat and add SHA256 checksumsmat2005-11-1414-0/+14
* Be hipe and add SHA256mat2005-11-142-0/+2
* - Fix permission of 002.drweb-smf.sh start scriptgarga2005-11-141-1/+1
* Remove explicit checks for /usr/bin/bzip2.edwin2005-11-141-3/+0
* Update latest phpSysInfo entry to reflect that 2.4 was in fact not fixedsimon2005-11-141-1/+2
* Upgrade to 0.13mharo2005-11-142-4/+5
* Upgrade to 1.25mharo2005-11-142-3/+3
* Upgrade to 1.6.8.12mharo2005-11-142-5/+4
* Add SHA256ade2005-11-141-0/+1
* Reset undeliverable maintainer address (past 1 month):kris2005-11-141-2/+2
* Reset undeliverable maintainer address:kris2005-11-141-1/+1
* Update to 2.0.10mnag2005-11-149-9/+39
* Update to 2.0.10mnag2005-11-149-6/+18
* - Micromedia -> Macromediasem2005-11-141-6/+6
* - Document phpSysInfo vulnerabilitysem2005-11-141-0/+34
* - Document flashplugin vulnerabilitysem2005-11-141-0/+43
* Add SHA256mnag2005-11-141-0/+1
* Add SHA256mnag2005-11-141-0/+2
* Update to 20051112mnag2005-11-142-3/+5
* Update to 1.3.1mnag2005-11-143-4/+15
* Add amavisd-milter 1.0.2, milter for amavisd-new.lawrance2005-11-147-0/+107
* - add SHA checksumdinoex2005-11-133-2/+6
* - Update to 1.2pav2005-11-135-15/+43
* Move IDN related ports from devel to dns category:pav2005-11-132-2/+2
* - Install man pagesem2005-11-132-1/+7
* Sud is a daemon to execute interactive and non-interactive processes withpav2005-11-125-0/+62
* activate use of USE_SQLITE.ume2005-11-121-2/+1
* Update to 2.6.1mnag2005-11-122-9/+10
* add SHA256brooks2005-11-121-0/+1
* Add security/p5-Authen-Htpasswd 0.12, a Perl module to read and modifytobez2005-11-115-0/+56
* This port installs a 5.x binary, so depend on the compat5x port onarved2005-11-111-0/+4
* - Yield to a total SHAtification.sem2005-11-111-0/+1
* Add denyhosts 1.1.2, script to thwart ssh attacks.vanilla2005-11-118-0/+216
* Add SHA256 checksumlioux2005-11-113-0/+3
* Add CONFLICTS= ipsec-tools-[0-9]*.sumikawa2005-11-111-0/+2
* With portmgr hat on, reset maintainership of knu's ports since he haslinimon2005-11-119-9/+9
* - Add SHA256 to all ports submitter maintaingarga2005-11-113-0/+3
* - CATEGORY CHANGE: add "net" secondary categorygarga2005-11-1015-66/+93
* - Document p5-Mail-SpamAssassin vulnerabily (alread fixed in ports)sem2005-11-101-0/+66
* Update to 4.33mnag2005-11-106-362/+248
* Update to DAT 4624jeh2005-11-102-3/+3
* Update to DAT 4623jeh2005-11-102-3/+3
* - Respect non-standard LOCALBASEgarga2005-11-101-4/+3
* - Add SHA256garga2005-11-101-0/+1
* - Add SHA256 checksums.flz2005-11-091-0/+1
* Move instant messaging related ports to newly created net-im category:pav2005-11-094-10/+10
* Add SHA256mnag2005-11-093-0/+4
* Update to 4.33mnag2005-11-097-382/+217
* Fix order in rc script to prevent errorsmnag2005-11-093-7/+13
* Update to 2.2.6mnag2005-11-099-244/+96
* Fix FreeBSD-4.11 build problemcy2005-11-098-20/+60
* Fix LOCALBASE issue.skv2005-11-091-0/+1
* Update the recent gallery2 and webcalendar entries:remko2005-11-091-5/+14
* - use USB_BDB.ume2005-11-093-20/+10
* - Add SHA256garga2005-11-084-0/+5
* Add SHA256 checksums for my portsarved2005-11-082-0/+2
* Document qpopper -- multiple privilege escalation vulnerabilities.remko2005-11-081-0/+32
* Update to DAT 4622jeh2005-11-082-3/+3
* install missed components.html document.ume2005-11-072-3/+5
* - Update to 2.5ehaupt2005-11-073-9/+53
* - Update to 20051104garga2005-11-072-3/+3
* - Add missed </p> tag [1]sem2005-11-071-2/+3
* Update to DAT 4621jeh2005-11-062-3/+3
* Chase gpgme updateoliver2005-11-061-2/+2
* Update to 0.87.1mnag2005-11-053-20/+3
* Update to KDE 3.4.3 / KOffice 1.4.2lofi2005-11-052-4/+4
* Update gpgme to 1.0.3 and chase shared library version bump.lofi2005-11-057-114/+19
* Chase glib20 and libsoup shared library version.marcus2005-11-051-1/+7
* Bump PORTREVISION to chase the glib20 shared library update.marcus2005-11-0524-15/+24
* Presenting GNOME 2.12 for FreeBSD. The release is chock full of bug fixesmarcus2005-11-0518-136/+216
* Enables self-tests with WITH_JAILmnag2005-11-056-6/+192
* Change MAINTAINERship to perl@.nork2005-11-052-2/+2
* Add a bit more info from the PEAR advisory about the vulnerability tosimon2005-11-051-0/+4
* The two latest OpenVPN vulnerabilities were both only for 2.0 andsimon2005-11-051-2/+4
* Drop maintainerjesper2005-11-052-2/+2
* Add an entry for pear-PEAR arbitrary code execution vulnerability.thierry2005-11-051-0/+28
* Fix plist.sumikawa2005-11-042-1/+3
* - Update to 2.0.5garga2005-11-039-9/+66
* Update to 0.6.0mnag2005-11-033-13/+11
* Drop INSTALLS_SHLIB/LDCONFIG_DIRS: Local shlibs are dlopenedvs2005-11-031-2/+0
* Update to stunnel 4.14, which is mostly a bugfix release.roam2005-11-035-3/+39
* Update to DAT 4617jeh2005-11-032-3/+3
* make security/cyrus-sasl2-ldapdb buildable with OpenLDAP 2.3.ume2005-11-031-1/+10
* Correct skype entry to match the correct fixed port version number.simon2005-11-021-1/+2
* Upgrade to 20051102a.sumikawa2005-11-025-48/+18
* Update to 2.0.4mnag2005-11-029-78/+15
* Assign maintainership to original submitter of this port.linimon2005-11-021-1/+1
* Document two OpenVPN vulnerabilities.simon2005-11-021-0/+67
* As Peter Jeremy points out, the recent lynx vulnerability also concernsnaddy2005-11-021-0/+5
* Change maintainer's emailmnag2005-11-021-1/+1
* Update maintainer's emailmnag2005-11-022-4/+4
* - Update maintainer's email addresspav2005-11-022-4/+4
* Upgrade to latest version.vanilla2005-11-024-26/+4
* Fix fetchingarved2005-11-011-1/+1
* Add p5-Authen-SASL-Cyrus 0.12, XS SASL Authentication.skv2005-11-015-0/+51
* - Document skype vulnerabilitiessem2005-11-011-2/+75
* Update to 0.9.3lofi2005-11-012-3/+3
* - Document CVE-2005-3258:sem2005-11-011-0/+32
* Fix makeinfo problem under FreeBSD-6.0.cy2005-11-0112-40/+28
* Update to 4.13, which ought to fix the libc_r detection problem inroam2005-11-012-4/+5
* Makeinfo 4.8 problem.cy2005-11-014-16/+12
* - Update security/base to 1.2.1, which fixes a SQL injection issuesem2005-11-013-3/+4
* - Document a BASE Basic Analysis and Security Engine vulnerabilitysem2005-11-011-0/+29
* Let the IGNORE message make a bit more sense and change it from:erwin2005-11-012-2/+2
* Back out the accidentally committed white-space modification parts ofsimon2005-11-011-8900/+12898
* Update to DAT 4616jeh2005-11-012-3/+3
* - Update to 0.81garga2005-10-317-46/+93
* Add entry for "fetchmail -- fetchmailconf local password exposure",barner2005-10-311-0/+31
* Update to 20051030mnag2005-10-312-6/+6
* Update to 4.6.2mnag2005-10-313-6/+8
* Document lynx remote buffer overflow in NNTP header handling.naddy2005-10-311-12960/+8995
* Remove opensc-esteid. The functionality has been merged into thelinimon2005-10-315-111/+0
* - Update to 2.3.1clement2005-10-305-53/+35
* Relocate BROKEN conditional.cy2005-10-304-16/+16
* Fails to build on 4.11.cy2005-10-304-0/+8
* BROKEN on 7.0: Does not compilekris2005-10-291-1/+7
* Update to DAT 4615jeh2005-10-292-3/+3
* Reset maintainer, does not respond to mails for 19 days. Since a fewehaupt2005-10-291-1/+1
* - Unbreak: Update to 0.46agarga2005-10-292-5/+3
* chkproc sends a 25 signal to init causing a reboot after a 30s sleepgarga2005-10-281-0/+2
* BROKEN: Does not buildkris2005-10-284-0/+8
* - Fix a ruby vulnerabuility in the safe level settings.sem2005-10-281-0/+36
* Update to DAT 4614jeh2005-10-282-3/+3
* - Update to 0.46garga2005-10-272-3/+3
* - Fix WWW linegarga2005-10-271-3/+1
* Add an additional MASTER_SITE provided by maintainer to fix fetch.novel2005-10-271-1/+2
* Add more references to entry net-snmp -- remote DoS vulnerability.simon2005-10-271-0/+3
* Update to 0.6.2ehaupt2005-10-272-5/+4
* Make this port sysinstall friendly.cy2005-10-2712-57/+18
* Update to DAT 4613jeh2005-10-272-3/+3
* - Mark linux-firefox 1.0.7 as fixedsimon2005-10-261-5/+6
* Update to 5.2mnag2005-10-262-3/+3
* - Update to 1.3.7ehaupt2005-10-262-6/+18
* Add misc/compat5x to "openssl -- potential SSL 2.0 rollback".lesi2005-10-261-1/+8
* Cosmetic formatting change.cy2005-10-263-3/+3
* Adjust port to installl sudoers.conf.sample as a reference sample file.cy2005-10-2612-6/+84
* Update to 1.13skv2005-10-252-3/+3
* - fix build in jaildinoex2005-10-253-0/+6
* Fix broken port, capture missing file in pkg-plist.cy2005-10-256-6/+9
* Update to 4611jeh2005-10-252-3/+3
* Update to 0.2.10krion2005-10-242-3/+3
* Also mark xli as vulnerable to xloadimage -- buffer overflows in NIFFsimon2005-10-241-0/+5
* For entry libgadu -- multiple vulnerabilities:simon2005-10-241-2/+3
* - Update to 3.0.19ehaupt2005-10-232-8/+11
* New style bsd.java.mk.nork2005-10-231-1/+2
* For entry zope28 -- expose RestructuredText functionality to untrustedsimon2005-10-231-3/+5
* Add java_policy 1.4.2, which provides JCE(Java Cryptographynork2005-10-234-0/+55
* Update to liedentd 1.1, which is PREFIX-aware.wes2005-10-223-6/+4
* Add another reference to clamav -- arbitrary code execution and DoSsimon2005-10-221-0/+2
* - Mark the port IGNORE in addition to DEPRECATED: the port does not buildsergei2005-10-221-0/+1
* - Mark the port DEPRECATED with expiration in a month:sergei2005-10-211-0/+3
* Update to 4609jeh2005-10-212-3/+3
* Document x11/xloadimage buffer overflows in NIFF image title handling.naddy2005-10-201-0/+39
* - Fix build of openssl-beta on 6.0dinoex2005-10-201-1/+1
* Update to 1.1.0 release, add a couple of tunables to the Makefile,ade2005-10-203-7/+9
* update to dat 4608jeh2005-10-202-3/+3
* Rename all CAN-yyyy-nnnn to CVE-yyyy-nnnn, with the exception of textnectar2005-10-201-688/+688
* - Update to 0.6garga2005-10-192-5/+6
* . respect PREFIXehaupt2005-10-192-2/+6
* For entry: snort -- Back Orifice preprocessor buffer overflow vulnerability:simon2005-10-191-1/+2
* Make PREFIX-safelofi2005-10-191-3/+3
* - Document snort -- Back Orifice preprocessor buffer overflow vulnerability.simon2005-10-191-2/+50
* Update to 1.2.2arved2005-10-192-4/+3
* - Update to 2.4.3, which includes a fix for a potential buffer overflowsergei2005-10-192-6/+6
* - Update to 0.10garga2005-10-192-3/+3
* - Update to 0.9.0sergei2005-10-193-23/+48
* Update to 4607jeh2005-10-192-3/+3
* - Update to 0.9.0sergei2005-10-184-100/+29
* Update to 0.13.tobez2005-10-183-4/+5
* Update to 4606jeh2005-10-182-3/+3
* Add a check to see if WITH_MILTER is not set (and don't build milterlawrance2005-10-171-1/+1
* Add p5-GD-SecurityImage, a Perl5 module for creating CAPTCHA security imagesehaupt2005-10-175-0/+55
* Respect $PREFIXvs2005-10-161-0/+3
* Update to 0.2.9krion2005-10-163-7/+5
* Correct description.ade2005-10-161-1/+1
* - new option WITHOUT_OPENSSL_SSE2dinoex2005-10-161-0/+4
* - update stable to 0.9.7idinoex2005-10-164-32/+4
* - force 0.9.7 for FREEBSD 6.0 RELEASEdinoex2005-10-161-0/+8
* This now links dynamically to the dependencies since they now provide them.kris2005-10-151-3/+3
* - Document www/webcalendar vulnerability.sem2005-10-151-0/+23
* - Document www/gallery2 vulnerability.sem2005-10-151-0/+35
* Add security/libpreludedb:sergei2005-10-156-0/+149
* - Respect NOPORTDOCSsergei2005-10-153-10/+28