aboutsummaryrefslogtreecommitdiffstats
path: root/security/pidentd/pkg-plist
stat options
Period:
Authors:

Commits per author per week (path 'security/pidentd/pkg-plist')

AuthorW03 2025W04 2025W05 2025W06 2025Total
Total00000
pendabot/npm_and_yarn/devel/electron6/files/ini-1.3.8&id=c47befa9436ff6366ad607d7b502832b8b3dd50d'>textproc/rubygem-rouge: Update from 1.10.1 to 2.0.5tz2016-08-10>* Fix build with thread-safe php.ale2012-02-101-0/+10 * Document new Chromium < 17.0.963.46 vulnerabilities.rene2012-02-091-0/+86 * - Restrict USE_PYTHON rangesunpoet2012-02-091-1/+1 * - Make non-interactive and remove IS_INTERACTIVEswills2012-02-091-1/+1 * - Update to 1.54jadawin2012-02-092-3/+3 * - Update to 0.8.6pgollucci2012-02-094-13/+22 * - Update to 2.8.18pgollucci2012-02-096-95/+20 * - Mark as deprecatedjadawin2012-02-081-0/+2 * - Fix build when using GCRYPT KNOBsbz2012-02-082-0/+12 * - Update to 2.2.0pgollucci2012-02-082-3/+3 * New Port: security/binwalkjgh2012-02-084-0/+56 * Document Drupal core multiple vulnerabilities.delphij2012-02-081-0/+52 * - Update to 0.0.6miwi2012-02-072-6/+3 * Fix up 3fd040be-4f0b-11e1-9e32-0025900931f by giving a better description.wxs2012-02-071-4/+11 * Use the correct variable that was obviously the intent of the authoreadler2012-02-071-1/+1 * - Chase unixODBC shlib bumpmiwi2012-02-061-1/+2 * Document "bugzilla" - multiple vulnerabilities.skv2012-02-061-0/+50 * If you used LDAP and NOPORTDOCS then the documentation directory would bewxs2012-02-062-1/+2 * - Replace WITH_GUI with WITH_X11 to adhear to standardszi2012-02-061-2/+2 * Document PHP remote code vulnerability.delphij2012-02-041-0/+26 * - Update to 1.4.0sbz2012-02-042-3/+7 * Update to 0.9.33 release.ale2012-02-032-3/+5 * Add vuxml entry for mathopd directory traversal vulnerability.rm2012-02-031-0/+27 * - adjust ordering for latest apache entryjgh2012-02-031-12/+12 * MITRE is spelled in all capital letters.wxs2012-02-021-1/+1 * Update to 1.4.8mm2012-02-022-3/+3 * - Remove missing file in previous commitsunpoet2012-02-021-13/+0 * document latest Apache vulnerabilitiesjgh2012-02-021-0/+54 * - fix sed regular expressionjgh2012-02-021-3/+4 * - Update to 1.3.2sunpoet2012-02-022-11/+8 * - Update to 1.5jgh2012-02-025-69/+12 * - Pet portlintsunpoet2012-02-023-25/+10 * - Reassign to the heaptabthorpe2012-02-013-3/+3 * document recent mozilla vulnerabilitiesflo2012-02-011-0/+79 * add upstream patch, to fix "__GNUC_MINOR is not defined" build error thatflo2012-02-012-0/+24 * Fix PORTREVISION typo.cy2012-01-311-1/+1 * Correct versions for sudo format string vulnerability.wxs2012-01-311-1/+2 * - Upgrade to 1.14.12 (minor bugfixes).kuriyama2012-01-315-29/+30 * Update package description.cy2012-01-312-6/+5 * Update 1.0.2 --> 1.0.4cy2012-01-312-6/+5 * Update to 1.8.3p2wxs2012-01-312-4/+4 * Document sudo format string vulnerability.wxs2012-01-311-0/+38 * - Fix build due to libtool updates. [1]scheidell2012-01-303-17/+169 * - update to 1.1.1dinoex2012-01-302-3/+3 * Document missing FreeBSD Security Advisories:wxs2012-01-301-2/+195 * - Adjust formatting for 93688f8f-4935-11e1-89b4-001ec9578670zi2012-01-301-8/+10 * - Fix build on 10-current (i386) [1]kuriyama2012-01-292-0/+12 * - Mark BROKEN under FreeBSD 10zi2012-01-291-0/+4 * - Document vulnerabilities in mail/postfixadmin (CVE-2012-0811, CVE-2012-0812)zi2012-01-281-0/+39 * - Update to 1.0.1miwi2012-01-282-6/+5 * - Update to 1.7.7miwi2012-01-282-3/+3 * - Cleanup & Formatingmiwi2012-01-281-32/+32 * Additional software only options and binary package build tweaks.`cy2012-01-282-26/+76 * Fix typo.cy2012-01-271-1/+1 * - Document vulnerability in converters/mpackzi2012-01-261-0/+27 * - Document vulnerabilities in print/acroread9 (prior to 9.4.7)zi2012-01-261-0/+46 * Somehow a character got lostarved2012-01-261-1/+1 * - Update to 0.18ashish2012-01-262-3/+3 * - Update to 5.70ashish2012-01-262-3/+3 * Binary package improvements.cy2012-01-262-16/+83 * Update 2.4.1.2 --> 2.4.2.2.cy2012-01-265-10/+110 * The KDE/FreeBSD team is pleased to announce KDE SC 4.7.4, whichavilla2012-01-254-6/+6 * Apply utmp patch from ${FILESDIR} (not files) if OSVERSION < 900007jgh2012-01-251-2/+2 * - Update to 1.3.1jgh2012-01-253-13/+14 * update to 0.2.3.11-alphabf2012-01-242-3/+3 * update lang/sbcl to 1.0.55, and adjust dependent portsbf2012-01-241-1/+1 * Dancer::Plugin::Passphrase manages the hashing of passwords for Dancer apps,culot2012-01-245-0/+49 * - update entry fixed in chromium-16.0.912.75 (CVE-2011-3925)rene2012-01-241-0/+40 * Fix build while chanting "I will run make validate". :(wxs2012-01-241-1/+1 * Add CVE for recent spamdyke buffer overflows.wxs2012-01-241-0/+1 * Document multiple vulnerabilities in wireshark, all of which havewxs2012-01-241-0/+58 * Whitespace cleanup.wxs2012-01-241-2/+2 * - Document buffer overflows in spamdyke.wxs2012-01-241-0/+33 * - update to DISTVERSION 201204ohauer2012-01-243-7/+6 * Update to 4.0.1.nobutaka2012-01-232-3/+3 * Fixup to please "make tidy". No need to wrap this line.wxs2012-01-231-2/+1 * - Add CVE for spamdyke STARTTLS plaintext injection.wxs2012-01-231-0/+2 * - Fix affected rubygem-rack version: add ,3 as PORTEPOCH=3 is restoredsunpoet2012-01-221-1/+1 * - Update to 0.22culot2012-01-223-5/+8 * - Correct package range in 5c5f19ce-43af-11e1-89b4-001ec9578670zi2012-01-221-1/+5 * At the moment 1385 ports use BUILD_DEPENDS= ${RUN_DEPENDS} and 450eadler2012-01-2272-72/+72 * - Fix issue when NOPORTDOCS and SNORTSAM are both definedzi2012-01-211-1/+3 * - Update to 2.9.2.1zi2012-01-212-3/+5 * - Fix formatting/topic in 91be81e7-3fea-11e1-afc7-2c4138874f7dzi2012-01-211-6/+25 * - Document security vulnerability in security/openssl (CVE-2012-0050)zi2012-01-211-0/+28 * fix uuid on latest tomcat vulnerabilityjgh2012-01-211-1/+1 * - Fix modified date;delphij2012-01-211-1/+3 * Update 91be81e7-3fea-11e1-afc7-2c4138874f7d to cover ruby+no-pthreads asdelphij2012-01-211-0/+2 * Remove license infodougb2012-01-202-4/+0 * Add pcsc-tools, tools for testing PCSC cards and readersarved2012-01-206-0/+63 * - document asterisk remote crash vulnerabilityflo2012-01-201-0/+31 * Document recent vulnerability of Apache Tomcat Server.jgh2012-01-201-0/+43 * - Security update to 1.0.0gdinoex2012-01-202-10/+10 * Sigh, should have used <lt> instead of <gt>.delphij2012-01-201-1/+1 * php52-exif no longer vulnerable to CVE-2011-4566 as of 5.2.17_6delphij2012-01-201-1/+2 * Fix the version range for ruby. The stock version is affected.knu2012-01-191-1/+1 * There was no patch release in rubygem-rack 1.3.5_*, so just say < 1.3.6.knu2012-01-191-1/+1 * - Fix affected rubygem-rack version: it should be _3 for PORTREVISION=3sunpoet2012-01-191-1/+1 * update math/R to 2.14.1, and adjust dependent portsbf2012-01-192-2/+2 * Fix CVE URL in recent OpenTTD entry.danfe2012-01-171-1/+1 * Unexpand (convert leading spaces to tabs when possible).danfe2012-01-171-871/+871 * Document recent vulnerability of OpenTTD game server.danfe2012-01-171-0/+34 * - transfer maintainership for my zope-ports to zope@rm2012-01-1623-46/+46 * PHP5 had its own entry for this vulnerability, so remove this.knu2012-01-161-5/+0 * Add node < 0.6.7 (for V8).knu2012-01-161-0/+4 * Add v8 < 3.8.5 (CVE-2011-5037).knu2012-01-161-0/+5 * Add PHP < 5.3.9 (CVE-2011-4885).knu2012-01-161-0/+5 * Add Multiple implementations denial-of-service via hash algorithm collision.knu2012-01-161-0/+41 * Add missing dependency to gnutls. [1]netchild2012-01-151-1/+2 * Certifi: Python Mozilla's SSL Certificates.miwi2012-01-155-0/+37 * - Update to 110511miwi2012-01-152-3/+3 * - fix runtime with ruby18 (add dependency on converters/ruby-iconv)rm2012-01-151-9/+5 * - escape shell namesdinoex2012-01-141-1/+1 * Add missing URL reference to last commitmm2012-01-141-0/+1 * Add relevant FFmpeg vulnerabilities from Ubuntu USN-1320-1mm2012-01-141-0/+55