aboutsummaryrefslogtreecommitdiffstats
path: root/security
Commit message (Expand)AuthorAgeFilesLines
* - Chase permanent redirectionpav2004-12-042-4/+2
* . Note that although linux-sun-jdk13 had one plugin vulnerability fixedglewis2004-12-041-1/+1
* Add ipv6 on CATEGORIES.sumikawa2004-12-032-2/+2
* Update to 0.9.10lofi2004-12-032-4/+4
* Update to 20041201 snapshot.ale2004-12-033-7/+28
* Document vulnerability that allows arbitrary command execution in rsshrushani2004-12-031-0/+33
* Document buffer overflows in rockdodger.naddy2004-12-031-0/+27
* - Add missed filesem2004-12-021-0/+20
* Add CVE to zip vulnerability.simon2004-12-021-0/+1
* Document a long path buffer overflow in zip.simon2004-12-021-0/+33
* update to 4411jeh2004-12-022-3/+3
* Document signal delivery vulnerability in sudoscript.simon2004-12-011-0/+23
* remove rubbish from the broken Makefileedwin2004-12-011-101/+0
* New port: security/pear-LiveUser PEAR user authentication andedwin2004-12-015-0/+217
* Document vulnerability in net/jabberd.josef2004-12-011-0/+27
* update to version 3.77eik2004-12-015-6/+6
* build & install two useful programs; testsaslauthd and saslcache.ume2004-12-012-1/+9
* Chase MASTER_SITESvs2004-11-301-1/+2
* Update to 1.6.8p5mharo2004-11-302-4/+4
* Fix build with native java.krion2004-11-301-0/+13
* Document vulnerability in net/opendchub.josef2004-11-301-0/+26
* - Teach configure about ia64 platform (similar to the recent amd64 fix)sergei2004-11-292-7/+8
* Update to 0.2.2krion2004-11-294-3/+8
* Add Bugtraq ID for SA-04:16.fetch entry.simon2004-11-291-0/+1
* remove needless definition.ume2004-11-282-10/+0
* cyrus-sasl2-saslauthd couldn't be built with system OpenSSL and BDB42.ume2004-11-282-2/+12
* - Update to 0.5sem2004-11-275-6/+28
* Update to 4.1.1krion2004-11-274-23/+15
* Update: security/osiris 4.0.5 -> 4.0.6edwin2004-11-273-12/+3
* New port: security/pear-Crypt_RC4 PEAR encryption class for RC4 encryptionedwin2004-11-274-0/+29
* Document two vulnerabilities in unarj.simon2004-11-271-0/+53
* . Mark linux-ibm-jdk as also vulnerable to the Java plugin vulnerability.glewis2004-11-261-0/+4
* Update to 0.6.8lofi2004-11-263-3/+13
* . Fix the range and add an additional range for the jdk vulnerability.glewis2004-11-261-1/+12
* . Fix whitespace.glewis2004-11-261-6/+6
* . Add an entry for the problem in the Java plugin.glewis2004-11-261-0/+31
* Update ruby CGI DoS entry to note that the most recent version insimon2004-11-251-2/+3
* Document vulnerability in ftp/prozilla.josef2004-11-251-0/+27
* - Update to 4.32.1sem2004-11-258-411/+322
* - Change Ocaml build dependency to a lighter lang/ocaml-nox11sergei2004-11-255-5/+48
* - Update to 4.32.2sem2004-11-257-172/+160
* Update to DAT 4410jeh2004-11-252-3/+3
* [MAINTAINER] security/f-prot: Make dependency on signatures optionaldaichi2004-11-251-3/+16
* Fix build with gssapi and krb5ume2004-11-252-2/+2
* correct fixed versionume2004-11-241-2/+2
* c0a269d5-3d16-11d9-8818-008088034841 andume2004-11-241-2/+6
* security/sudoscript to 2.1.2; fixes security bugdaichi2004-11-243-32/+31
* IGNORE: Changes the permissions on ${LOCALBASE}/binkris2004-11-241-0/+2
* - Standardize an EXPIRATION_DATE format.sem2004-11-241-1/+1
* BROKEN: Unfetchablekris2004-11-241-0/+2
* Maintainer no longer uses this software.linimon2004-11-241-1/+1
* Update to 0.3.2vs2004-11-234-39/+3
* Document that the twiki vulnerability is fixed in twiki-20040902.simon2004-11-231-1/+2
* add Cyrus IMAP Server multiple remote vulnerabilities.ume2004-11-231-0/+134
* Obfuscates email addresses.sem2004-11-236-0/+52
* Fixed memory leak.sumikawa2004-11-234-0/+86
* Update to version 0.0.20krion2004-11-232-3/+3
* I can't believe I had that link line backwards and I tested it. Anywaysjeh2004-11-221-2/+3
* Update to 0.0.15krion2004-11-222-3/+3
* Fix WWW: line.krion2004-11-221-1/+1
* Upgrade to version 4.40ejeh2004-11-223-25/+28
* - Update to 0.99pav2004-11-213-3/+5
* Add CVE reference for the SA-04:16.fetch entry.simon2004-11-211-0/+1
* - uvscan depends on libm.so.2jeh2004-11-212-8/+18
* Update to 20041119krion2004-11-212-3/+3
* Update to 4.4.8krion2004-11-212-3/+3
* With portmgr hat on, reset inactive maintainer. These ports are now uplinimon2004-11-201-1/+1
* Document vulnerability in phpmyadmin.josef2004-11-201-0/+25
* Update to DAT 4409jeh2004-11-192-3/+3
* Update to 0.2.1krion2004-11-192-3/+3
* Update to 2.4.3krion2004-11-192-3/+3
* Add localized versions of gd port to the VuXML entry.josef2004-11-191-0/+2
* - Update to 0.31 (see http://untroubled.org/cvm/NEWS for details)sergei2004-11-193-3/+12
* Document SA-04:16.fetch.simon2004-11-181-0/+36
* Update to 1.5mat2004-11-182-3/+3
* Update to DAT 4408jeh2004-11-182-3/+3
* Update to 0.3.1:vs2004-11-187-83/+185
* Fix build on 5.x.demon2004-11-182-3/+37
* Update to latest release of sudomharo2004-11-182-4/+4
* Add security/hpn-ssh, a high performance SSH based on OpenSSH, after abrooks2004-11-184-35/+31
* Update to DAT 4407jeh2004-11-182-3/+3
* Document the buffer overrun vulnerability in samba3josef2004-11-181-0/+27
* Correct range for xpdf vulnerability, as cups-base got a fixingjosef2004-11-181-1/+1
* Update to sudo-1.6.3p8, which *really* includes the CDPATH fix, androam2004-11-173-15/+5
* - Use "tail -F" rather than "tail -f".kuriyama2004-11-174-0/+61
* The last commit to japanese/samba also fixed the security issuejosef2004-11-171-1/+4
* Add CVE name to twiki entry.simon2004-11-171-0/+1
* Add teTeX-base to affected packages in xpdf's vuxml entry.josef2004-11-171-0/+4
* strip out CDPATHmharo2004-11-162-1/+11
* Document arbitrary shell command execution in twiki.simon2004-11-151-0/+33
* fix CAN-2004-0884.ume2004-11-152-1/+20
* Update to 20041114:vs2004-11-152-3/+3
* Document a format string vulnerability in proxytunnel.simon2004-11-151-0/+36
* - Update maintainer's email addresspav2004-11-1511-20/+20
* Correct URL to ddos_scan homepage.simon2004-11-151-1/+1
* - Update to 0.99sem2004-11-142-3/+3
* Update to version 0.0.19krion2004-11-143-5/+3
* Fix link issue under FreeBSD-4.X due to unsupported functions.cy2004-11-146-33/+69
* Update termlog from 2.0 to 2.2csjp2004-11-142-3/+3
* Fix entry date for the ruby entry from the last commit.simon2004-11-131-1/+1
* - Document at DoS in the Ruby CGI module.simon2004-11-131-0/+60
* Chase the Gaim 1.0.3 update.marcus2004-11-132-2/+2
* Update to 1.6.8p2mharo2004-11-132-4/+4
* Mention newly available pinentry-gtk2 in pkg-message.lofi2004-11-131-0/+1
* Add CVE name for gnats issue.nectar2004-11-121-1/+2
* Remove conditional runtime dependency on the gtar port, it's availablelofi2004-11-122-4/+0
* Note (likely) remotely exploitable vulnerability in samba 3.nectar2004-11-121-0/+33
* Document vulnerability in GNATS.josef2004-11-121-0/+24
* Document a XSS in squirrelmail.simon2004-11-121-0/+32
* Fix entry date.josef2004-11-121-1/+1
* Document BNC vulnerability.josef2004-11-121-0/+25
* Update to 1.0.3krion2004-11-122-4/+3
* - Reset bouncing maintainer's address:pav2004-11-121-1/+1
* Add spike-proxy, a professional-grade tool for looking for application-levelpav2004-11-126-0/+3346
* Update to 0.2.0krion2004-11-125-11/+59
* Note old hafiye bug.nectar2004-11-121-0/+36
* Bump PORTREVISION to reflect security update.nectar2004-11-121-0/+1
* Fix a format string vulnerability in ez-ipupdate.naddy2004-11-111-0/+27
* Document a buffer overflow in ImageMagick's EXIF parser.simon2004-11-111-0/+26
* Correct recent Apache 2 entry to not match Apache 1.X.simon2004-11-111-1/+2
* Change the libident dependency from BUILD_DEPENDS to LIB_DEPENDS.knu2004-11-111-1/+2
* Document vulnerability in Apache 2 (CAN-2004-0942).josef2004-11-111-0/+26
* Update the libxml vulnerability to indicate the fixed version.marcus2004-11-111-1/+2
* Update to DAT 4406jeh2004-11-112-3/+3
* Bump 29 ports that use GCONF_SCHEMAS. Somehow, the diff of GNOME 2.8.x hasmezz2004-11-102-2/+2
* Add pear-File_Passwd, class to manipulate and authenticate against standard U...pav2004-11-104-0/+38
* Document a format string vulnerability in socat.simon2004-11-101-0/+33
* - Update to 2.0.2pav2004-11-102-3/+3
* Document remote buffers overflow in libxml and libxml2.simon2004-11-101-0/+32
* - Add a hint on complete removal when deinstallingsem2004-11-102-0/+39
* - Add a hint on complete removal when deinstallingsem2004-11-102-0/+39
* The bugs discovered by Chris Evans have been fixednectar2004-11-101-2/+2
* Add security/sks - SKS OpenPGP Key Server:sergei2004-11-108-0/+134
* Massive ports move to better categories.skv2004-11-093-7/+3
* Update to DAT 4405jeh2004-11-092-3/+3
* warn to create sasldb2 by yourself in BATCH mode.ume2004-11-091-0/+4
* Remove the md5crk port. The cracking effort was ended after atrevor2004-11-094-45/+0
* - Update to 2.2.0sem2004-11-0811-18/+820
* Fix pkgnames for mod_include vulnerability.josef2004-11-081-6/+6
* Update to KDE 3.3.1lofi2004-11-084-6/+24
* Document a virus detection evasion in p5-Archive-Zip.simon2004-11-081-0/+27
* Add gnomekeyringmanager.marcus2004-11-081-0/+1
* Bump PORTREVISIONS for all ports that depend on atk or pango to ease in themarcus2004-11-0811-7/+11
* Add some files missed in the previous GNOME 2.8 update.marcus2004-11-0812-0/+184
* Presenting GNOME 2.8 for FreeBSD (2.8.1 to be exact).marcus2004-11-0810-14/+96
* - Update to 20041106pav2004-11-062-3/+3
* - Fix plistpav2004-11-062-1/+2
* Document mod_include vulnerability in apache and related ports.josef2004-11-061-0/+54
* - Upgrade to 2.2.0sem2004-11-0614-21/+2082
* - drop objects for win and vmsdinoex2004-11-061-0/+14
* - cleanup fipsdinoex2004-11-063-6/+17
* Update to 1.1kevlo2004-11-062-3/+3
* Document an insecure temporary file creation in postgresql-contrib.simon2004-11-061-0/+31
* Bump modified date in the entry for the last commit.simon2004-11-061-0/+1
* Update latest mpg123 entry to note that the port is fixed in the mostsimon2004-11-061-1/+1
* - Update to 2.2.0pav2004-11-064-21/+8
* There was a gd 1.X port with portepoch 2 for a while, so let the gdsimon2004-11-051-0/+1
* Document an integer overflow in the GD Graphics Library.simon2004-11-051-0/+33
* Add p5-POE-Component-SSLify 0.03, integrate SSL into POE.skv2004-11-055-0/+43
* Add p5-Filter-Crypto 1.00,skv2004-11-055-0/+75
* - Update to 20041101pav2004-11-0511-161/+181
* Add pinentry-gtk2, a GTK+ 2.0 version of the GnuPG password dialoglofi2004-11-052-0/+21
* Fix some brainos.lofi2004-11-051-6/+7
* Add hooks for new -gtk2 slaveport.lofi2004-11-053-4/+42
* - Update to 2.0.1pav2004-11-042-3/+3
* Correct entry date for the putty entry.simon2004-11-041-1/+1
* Document vulnerability in puttyjosef2004-11-041-0/+28
* - add patch files and unbreak this portleeym2004-11-044-8/+25
* Add an entry for a wzdftpd remote DoS.simon2004-11-041-0/+22
* Updates to the bogofilter entry:simon2004-11-041-1/+4
* Update to DAT 4404jeh2004-11-042-3/+3
* - Update to 4.0.5pav2004-11-032-3/+3
* - Update to 2.0.0pav2004-11-034-32/+23
* Update linux-openmotif to 2.2.4 to fix the security.mezz2004-11-021-1/+4
* A long-overdue dequoting of COMMENT. D'oh, I thought I'd done this,roam2004-11-023-3/+3
* - update to 1.1clsung2004-11-012-3/+3
* Update to 1.7.6.marcus2004-10-313-18/+17
* Add a sudo dependency and dependency on libutil.cy2004-10-303-0/+9
* Correct some tty handling problems.cy2004-10-306-18/+375
* Update to DAT 4403jeh2004-10-302-3/+3
* Update to DAT 4402jeh2004-10-292-3/+3
* Repair handling of ptys.cy2004-10-296-0/+129
* Introduce sudosh (sudo shell) into the Ports Tree.cy2004-10-2913-0/+100
* - Security Update to 0.56dinoex2004-10-282-3/+3
* Document rssh format string vulnerability.josef2004-10-281-0/+26
* - Update to 0.23pav2004-10-283-10/+10
* Update to DAT 4401jeh2004-10-282-3/+3
* Remove a DAT file that didn't completely download because it is not usefuljeh2004-10-281-11/+11
* Fix build on 4-stablevanilla2004-10-2718-3/+165
* Fix build on 4-stable.vanilla2004-10-276-3/+42
* Create a VuXML entry for Horde XSS help window vulnerability to replacenectar2004-10-272-1/+28
* - update to 1.0clsung2004-10-272-4/+4
* - Bugfix update to 0.9.7edinoex2004-10-276-59/+49
* Add an entry for a vulnerability fixed in horde-2.2.7.thierry2004-10-271-0/+1
* Chase libraries for new devel/libidn version.krion2004-10-262-2/+4
* Document a denial-of-service issue in bogofilter.nectar2004-10-261-0/+33
* Fix integer overflow vulnerabilities.nork2004-10-261-1/+4
* Document xpdf 2 and xpdf 3 vulnerabilities.nectar2004-10-261-0/+38
* Document several security issues in gaim, fixed in various versions fromnectar2004-10-261-5/+222
* Note that the Red Hat based linux_base ports containnectar2004-10-261-1/+2
* Braino: install the file with correct name.des2004-10-251-1/+4
* Clean up time for email addresses MIA!edwin2004-10-251-1/+1
* Add Auth_HTTP 2.0 from PEAR.des2004-10-254-0/+32
* Update to 2.1.20.ume2004-10-256-98/+91
* Document SSL_Cypherbypass vulnerability in mod_ssljosef2004-10-251-0/+71
* Add entries for vulnerabilites in imported xpdf code in kdegraphicslofi2004-10-241-0/+2
* fix unprev. IPv6 for FreeBSD 4oliver2004-10-242-3/+216
* - fix building problem and unbreak this portleeym2004-10-244-23/+27
* - Document more buffer overflows in mpg123.simon2004-10-241-0/+37
* I suck. (Correct a typo that would have been readily detected ifnectar2004-10-221-1/+1
* Add CVE name for cabextract issue.nectar2004-10-221-0/+2
* Fix a copy/paste typo in last commit.simon2004-10-221-1/+1
* Document DoS in Apache 2 SSL handling.simon2004-10-221-0/+37
* Mark deprecated due to no maintainer and unpatched denial-of-servicenectar2004-10-221-0/+3
* Note that xpm has been fixed.nectar2004-10-221-2/+8
* - bump PORTREVISION after update dependency.leeym2004-10-211-0/+1
* add procmail into dependency list.leeym2004-10-211-1/+2
* - Fix OPTIONS handlingpav2004-10-211-2/+2
* Update entry regarding INN 2.4.x buffer overflow:nectar2004-10-211-2/+3
* Document remote command execution vulnerability in phpMyAdmin.simon2004-10-211-0/+32
* - don't delete the virus database on deinstalldinoex2004-10-211-2/+2
* Update 1.3.4 --> 1.3.5cy2004-10-2120-196/+16
* Document insecure directory handling in cabextract.simon2004-10-211-0/+24
* - Update to 1.1 (final). For changes since 1.1-beta see the ChangeLogmarius2004-10-219-119/+159
* Chase the Gaim 1.0.2 upgrade.marcus2004-10-212-2/+2
* Update to DAT 4400jeh2004-10-212-3/+3
* Base if the last update was successful on the dontents of file_id.diz,jeh2004-10-211-2/+2
* Fix code so it is favored by both GCCs (2.x and 3.x), and unbreak the build.danfe2004-10-2012-4/+454
* - Update to 0.0.14pav2004-10-202-3/+3
* - Update to 0.0.18pav2004-10-203-8/+23
* - Update to 20041019sergei2004-10-202-3/+3
* Set correct entry date for the a2ps issue.simon2004-10-201-1/+1
* Document insecure command line argument handling in a2ps.simon2004-10-201-0/+41
* Document a vulnerability in ifmail. (There does not existnectar2004-10-201-0/+25
* - update to version 3.75eik2004-10-205-22/+7
* Document a vulnerability in imwheel.nectar2004-10-191-0/+35
* Add CVE names for FreeRADIUS vulnerabilities.nectar2004-10-191-1/+6
* Updated to 0.7askv2004-10-194-7/+7
* Document NTLM authentication vulnerability in squidjosef2004-10-191-0/+26
* Document a SQL command injection in Cacti.simon2004-10-191-0/+26
* - update to 0.80 releaseeik2004-10-182-3/+3
* Document a format string vulnerability in the apache13 mod_ssl proxysimon2004-10-181-0/+46
* - Change a few uses of <url> into <mlist>.simon2004-10-171-3/+3
* - Quick update to 0.0.8.1, bugfix release, because 0.0.8 was removedpav2004-10-174-6/+6
* - Update to 1.8.12 and unbreak on 5.xpav2004-10-162-8/+4
* Add clamassassinleeym2004-10-164-0/+46
* - Document remote DoS and loss of anonymity in Tor.simon2004-10-161-1/+35
* [1]:oliver2004-10-167-234/+154
* Update to 2.4.2.1krion2004-10-162-3/+3
* Kill off automake18, switching to automake19. Requiem Mors Pacem.ade2004-10-161-1/+2