/textproc/p5-XML-XPath/

gnome Git repository'/>
aboutsummaryrefslogtreecommitdiffstats
path: root/security
Commit message (Expand)AuthorAgeFilesLines
* Copy botan port to new port for botan 1.10 which can coexist withmadpilot2013-05-235-0/+101
* Update to 2.17.tobez2013-05-222-3/+3
* Fix vuxml by using the correct format for CVE names.rene2013-05-221-14/+14
* - Update to 1.17jadawin2013-05-222-8/+4
* List vulnerabilities fixed in www/chromium 27.0.1453.93 (which is therene2013-05-221-0/+66
* Update to latest snapshotjpaetzel2013-05-222-6/+19
* Mark BROKEN as I have received 2 separate reportsbdrewery2013-05-221-0/+2
* Update to 3.0.12. Changes:lx2013-05-222-3/+3
* Refactor the replay code to fix the reported vulnerability -- simply use mmap()mi2013-05-227-44/+266
* - Upgrade to 0.34.kuriyama2013-05-212-3/+3
* - Do not install COPYING, LICENSE is already defined [1]wg2013-05-211-2/+2
* - Do not mute install commandwg2013-05-211-2/+3
* - Update to 0.4.1wg2013-05-203-8/+9
* - Update to 0.7.3.1wg2013-05-206-66/+21
* Patch multiple vulnerabilities in x11-toolkits/plib.rakuco2013-05-191-0/+69
* - Update to 0.7.4rakuco2013-05-191-0/+32
* KDE/FreeBSD team presents KDE SC 4.10.3 ports!makc2013-05-192-4/+4
* - Update to 4.99zi2013-05-192-4/+4
* - Update to 6.2p2bdrewery2013-05-1815-261/+369
* - Bring in r199804 and r206397 from base to avoid killing sshd inbdrewery2013-05-171-0/+43
* - Remove copyright as it was a base customization that was removed inbdrewery2013-05-171-25/+0
* - Remove CHROOT option and patch. ChrootDirectory was added in 5.0bdrewery2013-05-172-35/+4
* Update the recent nginx entry to cover the exact version range and includedelphij2013-05-171-7/+18
* Use explicit IP for localhost rather than DNS name; this causes ipv6 attemptscrees2013-05-172-3/+4
* - Fix plistmiwi2013-05-162-8/+5
* - Fix plistmiwi2013-05-162-6/+2
* Add license info.obrien2013-05-161-0/+3
* Update to the latest version of Adobe Flasheadler2013-05-161-0/+38
* Update to version 3.5.0.danfe2013-05-162-4/+9
* - update firefox to 21.0flo2013-05-164-19/+86
* - Bump PORTREVISION after dns/c-ares updatezi2013-05-161-1/+1
* security/cfs: Resurrect and maintain CFS.crees2013-05-167-0/+136
* Update ranges according latest available information.osa2013-05-141-2/+2
* - Convert to PEAR_AUTOINSTALLmiwi2013-05-131-147/+3
* - Convert to PEAR_AUTOINSTALLmiwi2013-05-131-9/+2
* - Convert to PEAR_AUTOINSTALLmiwi2013-05-131-11/+3
* - Convert to PEAR_AUTOINSTALLmiwi2013-05-131-10/+3
* - Convert to PEAR_AUTOINSTALLmiwi2013-05-131-11/+3
* - Convert to PEAR_AUTOINSTALLmiwi2013-05-131-7/+2
* - Update to 1.7miwi2013-05-132-3/+3
* - Update emacs entry to correct the version ranges for CVE-2012-3479ashish2013-05-131-1/+1
* - Fix BROKEN after r317848 commitsbz2013-05-132-6/+66
* Rectify USE_TEX to support both of teTeX and TeXLive.hrs2013-05-121-1/+1
* - Update to 1.2.7jase2013-05-122-3/+3
* Horde update (introducing MongoDB support):mm2013-05-112-3/+3
* - Update to 0.4.1 [1]makc2013-05-114-30/+11
* - Upgrade to 2.0.20.kuriyama2013-05-112-6/+5
* Fix rc script.lme2013-05-111-2/+3
* - Update MASTER_SITESmiwi2013-05-101-12/+15
* Make TESTS a non-default optiongarga2013-05-082-2/+2
* Use package names rather than files in PYTHON_SITELIBDIR for depends.antoine2013-05-081-9/+9
* New port: security/py-plasoantoine2013-05-085-0/+77
* Update nginx entry to reflect the right version ranges for CVE-2013-2028.delphij2013-05-081-2/+3
* Fix typo.osa2013-05-071-1/+1
* Document nginx -- a stack-base buffer overflow.osa2013-05-071-0/+31
* Convert to use shebangfix USES flag.ehaupt2013-05-071-1/+2
* Convert USE_NCURSES by USES=ncursesbapt2013-05-063-4/+3
* update lang/sbcl to 1.1.7, and adjust dependent portsbf2013-05-061-1/+1
* Finish converting security from WITHOUT_NLS to PORT_OPTIONS:MNLSbapt2013-05-063-23/+17
* - Fix dependency.hrs2013-05-062-6/+53
* Remove *_DEPENDS from ports which depend on teTeX and add USE_TEX=tetexhrs2013-05-061-1/+1
* Fix installation of ports that rely on cp -n for installing files. r245960flo2013-05-051-1/+1
* Disable PIE on ARM. This was causing a crash at runtime.wxs2013-05-051-0/+4
* Fix after conversion to new options frameworkbapt2013-05-051-1/+1
* - Add a workaround when CC=clang [*].hrs2013-05-041-10/+11
* Update regripperplugins to 20130429antoine2013-05-042-5/+5
* Update regripper to 2.8antoine2013-05-042-6/+4
* Fix buildbapt2013-05-041-6/+2
* Fix build with bmake, while here adopt USES=pkgconfigbapt2013-05-041-2/+4
* Fix build with bmakebapt2013-05-041-5/+5
* New port: rcracki_mtantoine2013-05-044-0/+48
* - fix strongSwan discovery date /2013-05-03/2013-04-30/ohauer2013-05-041-1/+1
* - update to version 5.0.4 which fixes CVE-2013-2944.ohauer2013-05-045-4/+41
* Chase security/libgcrypt updateehaupt2013-05-041-1/+1
* Chase security/libgcrypt updateehaupt2013-05-0426-50/+42
* Update to 1.5.2ehaupt2013-05-044-43/+13
* Document Jenkins Security Advisory 2013-05-02lwhsu2013-05-041-0/+56
* Fix build with bmake as makebapt2013-05-031-0/+4
* Fix build with bmake as makebapt2013-05-031-0/+2
* - Update to 2.3ehaupt2013-05-032-12/+8
* Update to 5.6ehaupt2013-05-036-11/+13
* - Add the vendor patch for SQUID-2012:1 (CVE-2012-5643) and update VuXMLtmseck2013-05-03