| Commit message (Collapse) | Author | Age | Files | Lines |
|
|
|
|
| |
Approved by: maintainer timeout (security 3 days) remko (secteam)
Security: http://www.vuxml.org/freebsd/4872d9a7-4128-11dc-bdb0-0016179b2dd5.html
|
|
|
|
|
|
|
|
|
|
| |
- Solve fetch problem [2]
PR: ports/111014 [1], ports/112012 [2] (base on these two)
Submitted by: Scot Hetzel <swhetzel AT gmail.com> [1]
Craig Butler <craig001 AT lerwick.hopto.org> [2]
Approved by: "Francisco Cabrita <include>" <include AT npf.pt.freebsd.org>
(maintainer)
|
|
|
|
|
| |
- Set X11BASE to ${LOCALBASE} for recent ${OSVERSION}.
- Bump PORTREVISION for ports intalling files in ${X11BASE}.
|
|
|
|
|
|
|
|
|
|
|
| |
- Update MASTER_SITES
Release info for 1.0.12: http://www.joomla.org/content/view/2446/1/
PR: ports/107889
Submitted by: Francisco Alves Cabrita <include@npf.deec.uc.pt> (maintainer)
Approved by: erwin (mentor)
Security: CVE-2006-6832, CVE-2006-6833, CVE-2006-6834
|
|
|
|
|
|
| |
PR: ports/102746
Submitted by: Francisco Alves Cabrita <include@npf.deec.uc.pt> (maintainer)
Security: VuXML: 0ab423e7-3822-11db-81e1-000e0c2e438a
|
|
|
|
|
|
|
|
|
| |
within PEAR.php (as mentioned by the joomla developers).
The port should be upgraded to 1.0.11 to solve these issues, maintainer
had been informed.
With hat: secteam
|
|
|
|
|
|
|
|
|
|
| |
- Which fixes several vulnerabilities
- Security: http://www.joomla.org/content/view/1511/78/
PR: ports/99601
Submitted by: Francisco Alves Cabrita <include_at_npf.deec.uc.pt> (maintainer)
Approved by: markus (co mentor)
|
|
|
|
|
|
| |
PR: ports/98987
Submitted by: Francisco Alves Cabrita <include@npf.deec.uc.pt>
Approved by: krion (mentor)
|
|
|
|
|
|
| |
PR: ports/95266
Submitted by: Francisco Alves Cabrita <include@npf.deec.uc.pt> (maintainer)
Prodded by: the powers that are (wes)
|
|
|
|
|
| |
PR: ports/92884
Submitted by: Francisco Alves Cabrita <include@npf.pt.freebsd.org> (maintainer)
|
|
|
|
|
|
| |
PR: 92406
Submitted by: Piet Delport <pjd@satori.za.net>
Approved by: maintainer
|
|
|
|
|
|
|
|
|
|
| |
Security Vunerabilities - 1.0.5 Contains fixes for 1 Security Issue.
Medium Level Threats:
Hardened ability to use the contact component to proliferate spam.
Submitted by: Francisco Alves Cabrita <include@npf.deec.uc.pt>
PR: ports/91217
Security: Security Vunerabilities - 1.0.5 Contains fixes for 1 Security Issue.
|
|
|
|
| |
Asked by: maintainer
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
It fixes 6 Security Vunerabilities:
Critical Level Threats
Potentional XSS injection through GET and other variables
- Affects all previous versions of Joomla! and Mambo 4.5.2.3
Hardened SEF against XSS injection
- Affects all previous versions of Joomla! and Mambo 4.5.2.3
Low Level Threats
Potential SQL injection in Polls modules through the Itemid variable
- Affects all previous versions of Joomla! and Mambo 4.5.2.x series
Potential SQL injection in several methods in mosDBTable class
- Affects all previous versions of Joomla! and Mambo 4.5.2.x series
Potential misuse of Media component file management functions
- Affects all previous versions of Joomla! and Mambo 4.5.2.x series
Add search limit param (default of 50) to `Search` Mambots to prevent search flooding
- Affects all previous versions of Joomla! and Mambo 4.5.2.x series
PR: ports/89596
Submitted by: Francisco Alves Cabrita (maintainer)
|
|
Joomla! is one of the most powerful Open Source Content
Management Systems on the planet. It is used all over
the world for everything from simple websites to complex
corporate applications. Joomla! is easy to install,
simple to manage, and reliable.
WWW: http://www.joomla.org/
PR: ports/87522
Submitted by: Francisco Alves Cabrita <francisco@nortenet.pt>
|