/archivers/rpm/

/cgit-data/cgit.png' alt='cgit logo'/> index : freebsd-ports-graphics
FreeBSD graphics obsolete development ports (https://github.com/freebsd/freebsd-ports-graphics)
aboutsummaryrefslogtreecommitdiffstats
path: root/security
Commit message (Expand)AuthorAgeFilesLines
* Fix build with gssapi and krb5ume2004-11-252-2/+2
* correct fixed versionume2004-11-241-2/+2
* c0a269d5-3d16-11d9-8818-008088034841 andume2004-11-241-2/+6
* security/sudoscript to 2.1.2; fixes security bugdaichi2004-11-243-32/+31
* IGNORE: Changes the permissions on ${LOCALBASE}/binkris2004-11-241-0/+2
* - Standardize an EXPIRATION_DATE format.sem2004-11-241-1/+1
* BROKEN: Unfetchablekris2004-11-241-0/+2
* Maintainer no longer uses this software.linimon2004-11-241-1/+1
* Update to 0.3.2vs2004-11-234-39/+3
* Document that the twiki vulnerability is fixed in twiki-20040902.simon2004-11-231-1/+2
* add Cyrus IMAP Server multiple remote vulnerabilities.ume2004-11-231-0/+134
* Obfuscates email addresses.sem2004-11-236-0/+52
* Fixed memory leak.sumikawa2004-11-234-0/+86
* Update to version 0.0.20krion2004-11-232-3/+3
* I can't believe I had that link line backwards and I tested it. Anywaysjeh2004-11-221-2/+3
* Update to 0.0.15krion2004-11-222-3/+3
* Fix WWW: line.krion2004-11-221-1/+1
* Upgrade to version 4.40ejeh2004-11-223-25/+28
* - Update to 0.99pav2004-11-213-3/+5
* Add CVE reference for the SA-04:16.fetch entry.simon2004-11-211-0/+1
* - uvscan depends on libm.so.2jeh2004-11-212-8/+18
* Update to 20041119krion2004-11-212-3/+3
* Update to 4.4.8krion2004-11-212-3/+3
* With portmgr hat on, reset inactive maintainer. These ports are now uplinimon2004-11-201-1/+1
* Document vulnerability in phpmyadmin.josef2004-11-201-0/+25
* Update to DAT 4409jeh2004-11-192-3/+3
* Update to 0.2.1krion2004-11-192-3/+3
* Update to 2.4.3krion2004-11-192-3/+3
* Add localized versions of gd port to the VuXML entry.josef2004-11-191-0/+2
* - Update to 0.31 (see http://untroubled.org/cvm/NEWS for details)sergei2004-11-193-3/+12
* Document SA-04:16.fetch.simon2004-11-181-0/+36
* Update to 1.5mat2004-11-182-3/+3
* Update to DAT 4408jeh2004-11-182-3/+3
* Update to 0.3.1:vs2004-11-187-83/+185
* Fix build on 5.x.demon2004-11-182-3/+37
* Update to latest release of sudomharo2004-11-182-4/+4
* Add security/hpn-ssh, a high performance SSH based on OpenSSH, after abrooks2004-11-184-35/+31
* Update to DAT 4407jeh2004-11-182-3/+3
* Document the buffer overrun vulnerability in samba3josef2004-11-181-0/+27
* Correct range for xpdf vulnerability, as cups-base got a fixingjosef2004-11-181-1/+1
* Update to sudo-1.6.3p8, which *really* includes the CDPATH fix, androam2004-11-173-15/+5
* - Use "tail -F" rather than "tail -f".kuriyama2004-11-174-0/+61
* The last commit to japanese/samba also fixed the security issuejosef2004-11-171-1/+4
* Add CVE name to twiki entry.simon2004-11-171-0/+1
* Add teTeX-base to affected packages in xpdf's vuxml entry.josef2004-11-171-0/+4
* strip out CDPATHmharo2004-11-162-1/+11
* Document arbitrary shell command execution in twiki.simon2004-11-151-0/+33
* fix CAN-2004-0884.ume2004-11-152-1/+20
* Update to 20041114:vs2004-11-152-3/+3
* Document a format string vulnerability in proxytunnel.simon2004-11-151-0/+36
* - Update maintainer's email addresspav2004-11-1511-20/+20
* Correct URL to ddos_scan homepage.simon2004-11-151-1/+1
* - Update to 0.99sem2004-11-142-3/+3
* Update to version 0.0.19krion2004-11-143-5/+3
* Fix link issue under FreeBSD-4.X due to unsupported functions.cy2004-11-146-33/+69
* Update termlog from 2.0 to 2.2csjp2004-11-142-3/+3
* Fix entry date for the ruby entry from the last commit.simon2004-11-131-1/+1
* - Document at DoS in the Ruby CGI module.simon2004-11-131-0/+60
* Chase the Gaim 1.0.3 update.marcus2004-11-132-2/+2
* Update to 1.6.8p2mharo2004-11-132-4/+4
* Mention newly available pinentry-gtk2 in pkg-message.lofi2004-11-131-0/+1
* Add CVE name for gnats issue.nectar2004-11-121-1/+2
* Remove conditional runtime dependency on the gtar port, it's availablelofi2004-11-122-4/+0
* Note (likely) remotely exploitable vulnerability in samba 3.nectar2004-11-121-0/+33
* Document vulnerability in GNATS.josef2004-11-121-0/+24
* Document a XSS in squirrelmail.simon2004-11-121-0/+32
* Fix entry date.josef2004-11-121-1/+1
* Document BNC vulnerability.josef2004-11-121-0/+25
* Update to 1.0.3krion2004-11-122-4/+3
* - Reset bouncing maintainer's address:pav2004-11-121-1/+1
* Add spike-proxy, a professional-grade tool for looking for application-levelpav2004-11-126-0/+3346
* Update to 0.2.0krion2004-11-125-11/+59
* Note old hafiye bug.nectar2004-11-121-0/+36
* Bump PORTREVISION to reflect security update.nectar2004-11-121-0/+1
* Fix a format string vulnerability in ez-ipupdate.naddy2004-11-111-0/+27
* Document a buffer overflow in ImageMagick's EXIF parser.simon2004-11-111-0/+26
* Correct recent Apache 2 entry to not match Apache 1.X.simon2004-11-111-1/+2
* Change the libident dependency from BUILD_DEPENDS to LIB_DEPENDS.knu2004-11-111-1/+2
* Document vulnerability in Apache 2 (CAN-2004-0942).josef2004-11-111-0/+26
* Update the libxml vulnerability to indicate the fixed version.marcus2004-11-111-1/+2
* Update to DAT 4406jeh2004-11-112-3/+3
* Bump 29 ports that use GCONF_SCHEMAS. Somehow, the diff of GNOME 2.8.x hasmezz2004-11-102-2/+2
* Add pear-File_Passwd, class to manipulate and authenticate against standard U...pav2004-11-104-0/+38
* Document a format string vulnerability in socat.simon2004-11-101-0/+33
* - Update to 2.0.2pav2004-11-102-3/+3
* Document remote buffers overflow in libxml and libxml2.simon2004-11-101-0/+32
* - Add a hint on complete removal when deinstallingsem2004-11-102-0/+39
* - Add a hint on complete removal when deinstallingsem2004-11-102-0/+39
* The bugs discovered by Chris Evans have been fixednectar2004-11-101-2/+2
* Add security/sks - SKS OpenPGP Key Server:sergei2004-11-108-0/+134
* Massive ports move to better categories.skv2004-11-093-7/+3
* Update to DAT 4405jeh2004-11-092-3/+3
* warn to create sasldb2 by yourself in BATCH mode.ume2004-11-091-0/+4
* Remove the md5crk port. The cracking effort was ended after atrevor2004-11-094-45/+0
* - Update to 2.2.0sem2004-11-0811-18/+820
* Fix pkgnames for mod_include vulnerability.josef2004-11-081-6/+6
* Update to KDE 3.3.1lofi2004-11-084-6/+24
* Document a virus detection evasion in p5-Archive-Zip.simon2004-11-081-0/+27
* Add gnomekeyringmanager.marcus2004-11-081-0/+1
* Bump PORTREVISIONS for all ports that depend on atk or pango to ease in themarcus2004-11-0811-7/+11
* Add some files missed in the previous GNOME 2.8 update.marcus2004-11-0812-0/+184
* Presenting GNOME 2.8 for FreeBSD (2.8.1 to be exact).marcus2004-11-0810-14/+96
* - Update to 20041106pav2004-11-062-3/+3
* - Fix plistpav2004-11-062-1/+2
* Document mod_include vulnerability in apache and related ports.josef2004-11-061-0/+54
* - Upgrade to 2.2.0sem2004-11-0614-21/+2082
* - drop objects for win and vmsdinoex2004-11-061-0/+14
* - cleanup fipsdinoex2004-11-063-6/+17
* Update to 1.1kevlo2004-11-062-3/+3
* Document an insecure temporary file creation in postgresql-contrib.simon2004-11-061-0/+31
* Bump modified date in the entry for the last commit.simon2004-11-061-0/+1
* Update latest mpg123 entry to note that the port is fixed in the mostsimon2004-11-061-1/+1
* - Update to 2.2.0pav2004-11-064-21/+8
* There was a gd 1.X port with portepoch 2 for a while, so let the gdsimon2004-11-051-0/+1
* Document an integer overflow in the GD Graphics Library.simon2004-11-051-0/+33
* Add p5-POE-Component-SSLify 0.03, integrate SSL into POE.skv2004-11-055-0/+43
* Add p5-Filter-Crypto 1.00,skv2004-11-055-0/+75
* - Update to 20041101pav2004-11-0511-161/+181
* Add pinentry-gtk2, a GTK+ 2.0 version of the GnuPG password dialoglofi2004-11-052-0/+21
* Fix some brainos.lofi2004-11-051-6/+7
* Add hooks for new -gtk2 slaveport.lofi2004-11-053-4/+42
* - Update to 2.0.1pav2004-11-042-3/+3
* Correct entry date for the putty entry.simon2004-11-041-1/+1
* Document vulnerability in puttyjosef2004-11-041-0/+28
* - add patch files and unbreak this portleeym2004-11-04