aboutsummaryrefslogtreecommitdiffstats
path: root/security
Commit message (Expand)AuthorAgeFilesLines
* - Update to 3.26.0 to fix fetching [1]erwin2005-10-123-12/+8
* Update to DAT 4602jeh2005-10-122-3/+3
* - Update to 0.6.6garga2005-10-125-36/+52
* - Update to 0.06 [1]erwin2005-10-122-10/+16
* Fix MASTER_SITE I botched in the previous commitvs2005-10-111-1/+1
* Update to DAT 4601jeh2005-10-112-3/+3
* Upgrade to 5.0edwin2005-10-114-29/+24
* Update to 0.6.2mnag2005-10-103-12/+21
* Update to DAT 4600jeh2005-10-102-3/+3
* Fix MASTER_SITES and use MAKE_ARGS instead of patch.vs2005-10-102-13/+2
* Reset bouncing maintainer address, remove stale mastersite.linimon2005-10-101-3/+2
* For libxine -- format string vulnerability entry:simon2005-10-101-5/+6
* Add gwee, a tool to exploit command execution vulnerabilities in web scripts.ehaupt2005-10-104-0/+42
* Add an entry for libxine format string vulnerability.nobutaka2005-10-101-0/+31
* Warren requested that this port be removed. I've just un-MAINTAINER-izedfenner2005-10-091-1/+1
* Mark older revisions linux_base-suse 9.3 as vulnerable to kdebase --simon2005-10-091-0/+5
* Remove WWW: None.fenner2005-10-091-1/+0
* - Fix handling of & sign, it need to be escaped for XML storagepav2005-10-093-1/+55
* - Set CONFLICTS with krb4 and krb5pav2005-10-091-2/+4
* - Set CONFLICTS with heimdal and krb5pav2005-10-091-2/+4
* - Set CONFLICTS with heimdal and krb4pav2005-10-094-4/+12
* - Fix pkg-plistlawrance2005-10-084-9/+12
* Update to 0.8.marcus2005-10-084-11/+11
* Update master sites.ehaupt2005-10-084-4/+0
* Update master sites.ehaupt2005-10-084-4/+0
* - Update to 2.4.1sergei2005-10-078-179/+58
* - Update to 0.9.0sergei2005-10-074-130/+124
* - Mark cfengine's arbitrary file overwriting vulnerability as fixed in 2.1.6_1sergei2005-10-071-0/+6
* Remove trailing backslash from MASTER_SITES which caused thefenner2005-10-071-2/+2
* Remove obsolete mastersites.linimon2005-10-071-6/+0
* Update to 20051006mnag2005-10-072-3/+3
* Update to 4.6.1mnag2005-10-074-5/+8
* Change MAINTAINER address for my ports.ehaupt2005-10-068-8/+8
* - Update to 1.6.39barner2005-10-063-11/+10
* Add an entry for UW-IMAP Mailbox Name Handling Remote Buffer Overflowthierry2005-10-061-0/+35
* Update to 0.7mnag2005-10-063-11/+9
* New portmnag2005-10-066-0/+92
* Add credit for recent ftp/weex incidentehaupt2005-10-051-1/+1
* - Update to 1.1 (minor bugfixes)sergei2005-10-052-6/+5
* [maintainer update] update security/pamtesteredwin2005-10-052-3/+3
* Update 1.8.1 --> 1.8.2cy2005-10-056-9/+9
* Update 1.4.1 --> 1.4.2cy2005-10-0516-132/+12
* Update to DAT 4596jeh2005-10-052-3/+3
* Update update_dat to use fetch and be a little more robust. Thanks tojeh2005-10-051-16/+14
* Update to 20051003mnag2005-10-042-25/+24
* rinetd >= 0.62_1 has no more vulnerabilitiesgarga2005-10-041-2/+5
* - bump SHLIB versiondinoex2005-10-041-2/+3
* Changelog:clsung2005-10-043-8/+5
* Update to 4595jeh2005-10-042-3/+3
* o Fix whitespace (to tab)mich2005-10-032-6/+6
* Add references to three squid entries.remko2005-10-031-5/+15
* Use the <freebsdpr> tag to markup a PR in weex -- remote format stringsimon2005-10-031-1/+1
* Document a format string vulnerability in ftp/weex.jylefort2005-10-031-0/+30
* Document picasm -- buffer overflow vulnerability.simon2005-10-021-0/+33
* - Fix MASTER_SITESdinoex2005-10-021-1/+2
* Add an URL to the entry of the japanese/uim.nobutaka2005-10-021-1/+1
* Document japanese/uim privilege escalation vulnerability.nobutaka2005-10-021-0/+31
* Document cfengine -- arbitrary file overwriting vulnerability.simon2005-10-011-0/+32
* Mark zsync <= 0.4.1 vulnerable to the zlib buffer overflow vulnerability.remko2005-10-011-0/+5
* Add more references to unace -- multiple vulnerabilities entry.simon2005-10-011-0/+3
* Add CVE name to an older ProZilla entry.simon2005-10-011-0/+2
* Reset maintainer who had turned in his commit bit some time back as he nolinimon2005-10-011-1/+1
* Update to DAT 4594jeh2005-10-012-3/+3
* Update to 1.12skv2005-10-012-3/+3
* - Use DOCSDIR, PORTDOCS and NOPORTDOCSgarga2005-09-302-18/+8
* With portmgr hat on, reset maintainer. There have been several maintainerlinimon2005-09-301-1/+1
* Update to 2.5.5mnag2005-09-302-17/+16
* Add more references for latest phpmyfaq entry.simon2005-09-301-0/+9
* - Add a note that new entries, per convention, should be added to thesimon2005-09-301-5/+11
* Document vulnerabilities in www/phpmyfaqvsevolod2005-09-291-0/+25
* Update to 4592jeh2005-09-292-3/+3
* - Update to 1.1.1-9. For a list of changes since 1.1.0-7 please see themarius2005-09-288-61/+34
* Chase updated mastersite.linimon2005-09-281-1/+1
* Remove obsolete mastersite.linimon2005-09-282-3/+1
* - update to 3.0.18dinoex2005-09-282-21/+11
* make it compilable with OpenSSL 0.9.8.ume2005-09-281-0/+12
* - s/malloc.h/stdlib.h/ on some files to fix build on amd64 - 7.x [1]garga2005-09-284-37/+7
* Update to 4590jeh2005-09-272-3/+3
* Add tthsum 1.1.0, a command-line utility for generating and checking TTHgarga2005-09-267-0/+88
* -Remove MANCOMPRESSED macro as it's not requiredcsjp2005-09-251-1/+6
* Add a missing dependency.tobez2005-09-251-1/+3
* - update to 1.03leeym2005-09-252-4/+4
* Update to 0.32.novel2005-09-242-4/+5
* Add linux_base-suse-9.3 to the zlib entry.remko2005-09-241-0/+5
* Mark FORBIDDEN due to arbitrary code execution vulnerability.simon2005-09-241-0/+2
* Document clamav -- arbitrary code execution and DoS vulnerabilities.simon2005-09-241-0/+39
* - Be consistent and call entries "firefox & mozilla", not the other waysimon2005-09-241-2/+12
* - Document mozilla & firefox -- multiple vulnerabilities.simon2005-09-241-0/+147
* Update to 4589jeh2005-09-242-3/+3
* Checking MACHINE_ARCH is deprecated.trevor2005-09-241-1/+1
* search.cpan.org redirect reduction canonicalization project, pass 3:fenner2005-09-231-1/+1
* Update to 4588jeh2005-09-232-3/+3
* - presrve downloaded cvd files on deinstalldinoex2005-09-222-6/+6
* Fix DISTNAME variable.vsevolod2005-09-221-1/+1
* Add real references to urban -- stack overflow vulnerabilities.simon2005-09-221-5/+3
* Update to 2.0.10 [1]vsevolod2005-09-222-4/+6
* Document mozilla & firefox -- command line URL shell command injection.simon2005-09-221-0/+87
* - mark BROKEN for FreeBSD >= 7dinoex2005-09-221-2/+8
* Add CVE name for tor -- diffie-hellman handshake flaw.simon2005-09-221-0/+2
* Correct package name for entry bind -- buffer overrun vulnerability.simon2005-09-221-1/+2
* Add CVE name to an older CUPS issue.simon2005-09-221-0/+2
* search.cpan.org redirect reduction canonicalization project, pass 2:fenner2005-09-225-5/+5
* search.cpan.org redirect reduction canonicalization project, pass 1:fenner2005-09-2215-15/+15
* Update to 4587jeh2005-09-212-3/+3
* Update to 0.31mnag2005-09-212-3/+3
* Upgrade termlog. This fixes termlog on -CURRENT and hopefully the snpcsjp2005-09-212-3/+3
* - update to 0.22leeym2005-09-212-4/+4
* Fix build with milter on FreeBSD 4.X.simon2005-09-211-0/+16
* update to 2.5.3oliver2005-09-213-17/+18
* Update to 4586jeh2005-09-212-3/+3
* Update to 4585jeh2005-09-202-3/+3
* Reset maintainership of Seamus Venasse who has not responded for some time.erwin2005-09-204-4/+4
* - Update to 0.87pav2005-09-206-38/+4
* - update default to 0.9.8dinoex2005-09-201-15/+18
* Fix BUILD_DEPENDS on libpcap for -STABLE, it was overriding the dependencyse2005-09-201-1/+1
* Update to 4584jeh2005-09-202-3/+3
* Add missed dependency from textproc/py-libxml2 [1]vsevolod2005-09-202-10/+91
* Fix the htdig entry, the port version and the VuXML version did notremko2005-09-201-1/+1
* Fix the squirrelmail entry since only versions prior to 1.4.5 wereremko2005-09-201-1/+2
* Fixed plist.lth2005-09-191-1/+0
* Pamsfs is a PAM module that logs a user into a SFS server onpav2005-09-185-0/+145
* FreeBSD 6 no longer adds debug.if_* sysctl variables in its default kernelvs2005-09-186-3/+18
* Document the following items:remko2005-09-181-0/+60
* Add p5-Digest-SHA 5.31, Perl extension for SHA-1/224/256/384/512.lth2005-09-185-0/+47
* Fixed plistlth2005-09-171-1/+1
* Update to 0.6.0mnag2005-09-176-140/+15
* Update my emailmnag2005-09-175-6/+6
* Update to 3.2.2mnag2005-09-163-11/+11
* - Update to 3.93garga2005-09-162-3/+3
* ClusterSSH controls a number of xterm windows via a single graphicalpav2005-09-164-0/+35
* - Add an entry on possible DOS condition regarding NTLM in squidpav2005-09-161-0/+28
* Udate to DAT 4582jeh2005-09-162-3/+3
* Add p5-Crypt-NULL 1.02, perl implementation of the NULL encryptionlth2005-09-155-0/+39
* Update to 0.6.1vsevolod2005-09-153-4/+3
* - Firewalk port really depends on net/libnet-devel, but the check can be sati...vs2005-09-152-1/+14
* Update to 0.4.5.marcus2005-09-154-6/+6
* - Update to 0.9.6pav2005-09-155-27/+23
* - Remove dependencies on security/pf, it was removed. pf is in base sincepav2005-09-151-4/+2
* - Remove security/pf and security/authpf ports. They were only useful onpav2005-09-1521-1392/+0
* Document X11 server -- pixmap allocation vulnerability.lesi2005-09-151-0/+33
* Update to DAT 4581jeh2005-09-152-3/+3
* Drop maintainership, since I'm buried in the $REALLIFE stuff.krion2005-09-141-1/+1
* Add signing-party.jylefort2005-09-144-0/+81
* - Website is gonepav2005-09-141-1/+0
* Document unzip -- permission race vulnerability. [1]remko2005-09-141-1/+35
* Update to DAT 4580jeh2005-09-142-3/+3
* change USE_PERL5 to USE_PERL5_BUILD because perl is only needed during theoliver2005-09-131-1/+1
* - Fix WWWgarga2005-09-131-1/+1
* Update to DAT 4579jeh2005-09-132-3/+3
* Update to 0.3.6b that fixes build with samba 3.0.20.vsevolod2005-09-122-3/+3
* Update to 1.9.19lofi2005-09-123-14/+3
* Update to 0.9.12lofi2005-09-123-3/+15
* Update to 1.16skv2005-09-122-3/+3
* Update to 1.11skv2005-09-122-3/+3
* - Revive CONFLICTS with gnutls-devel [1]novel2005-09-112-4/+3
* Document firefox & mozilla -- buffer overflow vulnerability.simon2005-09-111-0/+97
* - Replace .error with IGNORE to prevent INDEX build failurespav2005-09-111-12/+3
* - Only for FreeBSD 4.X and 5.Xpav2005-09-111-0/+4
* Update to DAT 4578jeh2005-09-102-3/+3
* - Update WWWpav2005-09-101-4/+1
* - Update to 2.1.0pav2005-09-102-7/+3
* Don't CONFLICTS with gnutls-devel since it has been removed.novel2005-09-091-2/+0
* Update to 0.9.6lawrance2005-09-0923-503/+118
* Give maintainership to submitterlawrance2005-09-091-1/+1
* Update to DAT 4577jeh2005-09-092-3/+3
* Update to version 3.90krion2005-09-082-3/+4
* Assign maintainership to daniel@roe.chkrion2005-09-081-1/+1
* Update to DAT 4576jeh2005-09-082-3/+3
* s/BROKEN/IGNORE/lawrance2005-09-071-1/+1
* Mark broken for OSVERSION >= 500000. Does not build withoutlawrance2005-09-071-0/+4
* Forgot to uncomment OPTIONS after testing.novel2005-09-071-4/+4
* Mark the latest version of cups-base fixed for "xpdf -- disk fill DoSlawrance2005-09-071-2/+2
* - Patch file updated to process rule numbers above 999.leeym2005-09-073-10/+2
* Update to DAT 4575jeh2005-09-072-3/+3
* Add ncrypt 0.7.0, advanced AES file encryption tool.garga2005-09-066-0/+72
* - Pass maintainership to submitter, since he sent the last patch.garga2005-09-061-1/+1
* Update to DAT 4574jeh2005-09-062-3/+3
* Update WWW and MASTER_SITES.demon2005-09-062-2/+3
* Fix build with openssl-0.9.8.demon2005-09-063-12/+51
* Update to 0.4.4.marcus2005-09-064-8/+6
* Add IPSec tools port - the new "official" version of racoon,vsevolod2005-09-056-0/+185
* - clamsmtp 1.5 works only in debug mode.clsung2005-09-053-3/+60
* Revert back to devel/bisonade2005-09-051-1/+1
* - Update to 1.1sem2005-09-055-43/+4
* - Update to 1.1.4sem2005-09-053-4/+5
* Add forgotten </package> line.remko2005-09-041-0/+1
* Mark b2evolution prior to 0.9.0.12_2 vulnerable to the XML_RPC remote php cod...remko2005-09-041-1/+5
* - Unbreak vpnc-disconnect by fixing the config.c patchlawrance2005-09-043-19/+18
* Document htdig -- cross site scripting vulnerability.remko2005-09-041-0/+29
* - Document two squid security related issues.sem2005-09-041-0/+55
* Document bind9 -- denial of service.remko2005-09-041-0/+44
* Bcrypt is a blowfish file encryption utility which aims for cross-platformsem2005-09-044-0/+54
* ipguard listens network for ARP packets. All permitted MAC/IP pairssem2005-09-047-0/+83
* Document bind -- buffer overrun vulnerabilityremko2005-09-041-0/+28
* - update to 2.15leeym2005-09-042-4/+5
* - version 1.5 must start with '-d 4'clsung2005-09-032-3/+3
* Update to 4.1.9.novel2005-09-033-7/+22
* Correctly fix RUN_DEPENDSade2005-09-031-1/+1
* Update to DAT 4573jeh2005-09-032-3/+3
* Add p5-Net-Daemon-SSL 1.0, perl5 extension for portable daemons.garga2005-09-035-0/+42
* Fix build on 4-stable: Use ports version of libpcap since system versionse2005-09-031-1/+7
* Compile errors on ia64 and sparc64, do not build on those archs.se2005-09-031-0/+1
* - Update to 0.1.0.14garga2005-09-026-10/+28
* Add a more or less bogus reference section to the last entry, to make itsimon2005-09-021-0/+7
* Document stack overflow vulnerabilities in games/urban.jylefort2005-09-021-0/+22
* Update to DAT 4572jeh2005-09-022-3/+3
* - Switch bison dependency to bison175 portpav2005-09-021-1/+2
* Add p5-Net-OpenID-Server.jylefort2005-09-025-0/+50
* Add p5-Data-Password.jylefort2005-09-025-0/+37
* - Update to 4.2p1garga2005-09-025-146/+70
* Fix build with openldap23 libraries.vsevolod2005-09-011-1/+1
* Remove mastersite which has gone away.linimon2005-09-012-3/+1
* Update snortsms to version 1.0.0lawrance2005-09-013-7/+41
* - Update to 0.4.5pav2005-09-013-24/+35
* Update to DAT 4571jeh2005-09-012-3/+3
* - Update to 0.76sergei2005-08-312-5/+5
* Update to 0.9skv2005-08-313-7/+7
* - Update to 2.0.9pav2005-08-312-7/+30
* - Bandaid compilation on FreeBSD 5.2.1pav2005-08-311-0/+4
* - Revert back to MASTER_SITE_MOZILLApav2005-08-311-5/+2
* The distfile was rerolled to include a dbm subdirectory (which we no longermarcus2005-08-312-9/+6
* Now that misc/compat5x exists use the FreeBSD 5 binary on FreeBSD > 600004marius2005-08-311-4/+4
* Update to 1.8.novel2005-08-312-10/+10
* Update to DAT 4570jeh2005-08-312-3/+3
* - Distfile was rerolled; put old distfile on MASTER_SITE_LOCAL for nowpav2005-08-301-2/+5
* - Pass maintainership of gnutls, libtasn1 and opencdk ports tosergei2005-08-303-3/+3
* - Remove gnutls-devel port: this development version of GnuTLS librarysergei2005-08-304-122/+0
* - Disconnect gnutls-devel from the parent Makefile prior to removalsergei2005-08-301-1/+0
* upgrade to 0.0.16ijliao2005-08-304-4/+7
* upgrade to 0.0.22ijliao2005-08-303-3/+5
* Remove old library compatibility checking.sumikawa2005-08-301-4/+0
* Mark latest evolution port version as fixed wrt. evolution -- remotesimon2005-08-301-1/+2
* - Update to 2.0.2 that brings these upstream changes:garga2005-08-309-162/+9
* Update to DAT 4569jeh2005-08-302-4/+3
* Add entry for fswiki's vuln.kuriyama2005-08-291-0/+22
* - Update to 1.06pav2005-08-294-16/+84
* - Update to 1.3.6sem2005-08-293-9/+9
* - Update to 1.5.0sem2005-08-295-24/+39
* - Update to 0.75sergei2005-08-293-10/+30
* Update to DAT 4568jeh2005-08-292-3/+3
* Dante 1.1.15 is no longer affected by the fd_set bitmap index overflow.niels2005-08-291-2/+5
* Update amavisd-new to 2.3.3. [1]lesi2005-08-293-5/+3
* - Update to 1.5clsung2005-08-292-3/+3
* - Fill out part of the std. VuXML template missed in the last entry.simon2005-08-291-2/+3
* Update to 1.3lioux2005-08-293-96/+13
* Update to 0.2.7krion2005-08-282-3/+3
* Chase the libsoup shared lib version.marcus2005-08-281-1/+2
* Chase the Gaim 1.5.0 update.marcus2005-08-284-4/+4
* Document evolution -- remote format string vulnerabilities.simon2005-08-281-0/+43
* Document pam_ldap -- authentication bypass vulnerability.simon2005-08-281-0/+32