aboutsummaryrefslogtreecommitdiffstats
path: root/mail/prom-wl
ModeNameSize
-rw-r--r--Makefile1349logstatsplainblame
-rw-r--r--distinfo62logstatsplainblame
d---------files119logstatsplain
-rw-r--r--pkg-comment44logstatsplainblame
-rw-r--r--pkg-descr1088logstatsplainblame
-rw-r--r--pkg-plist398logstatsplainblame
/+0 * Mark latest evolution port version as fixed wrt. evolution -- remotesimon2005-08-301-1/+2 * - Update to 2.0.2 that brings these upstream changes:garga2005-08-309-162/+9 * Update to DAT 4569jeh2005-08-302-4/+3 * Add entry for fswiki's vuln.kuriyama2005-08-291-0/+22 * - Update to 1.06pav2005-08-294-16/+84 * - Update to 1.3.6sem2005-08-293-9/+9 * - Update to 1.5.0sem2005-08-295-24/+39 * - Update to 0.75sergei2005-08-293-10/+30 * Update to DAT 4568jeh2005-08-292-3/+3 * Dante 1.1.15 is no longer affected by the fd_set bitmap index overflow.niels2005-08-291-2/+5 * Update amavisd-new to 2.3.3. [1]lesi2005-08-293-5/+3 * - Update to 1.5clsung2005-08-292-3/+3 * - Fill out part of the std. VuXML template missed in the last entry.simon2005-08-291-2/+3 * Update to 1.3lioux2005-08-293-96/+13 * Update to 0.2.7krion2005-08-282-3/+3 * Chase the libsoup shared lib version.marcus2005-08-281-1/+2 * Chase the Gaim 1.5.0 update.marcus2005-08-284-4/+4 * Document evolution -- remote format string vulnerabilities.simon2005-08-281-0/+43 * Document pam_ldap -- authentication bypass vulnerability.simon2005-08-281-0/+32 * Update to 1.8.0.marcus2005-08-284-11/+8 * Mark phpgroupware as vulnerable to pear-XML_RPC -- remote PHP codesimon2005-08-281-1/+6 * Document pcre -- regular expression buffer overflow.simon2005-08-271-0/+29 * Fix build on 6.xkrion2005-08-261-0/+3 * Fix build on 6.xkrion2005-08-241-0/+14 * Fix for broken build under 4.X.cy2005-08-241-4/+7 * Mark latest awstats port as fixed for awstats -- arbitrary codesimon2005-08-241-1/+2 * Document mail/elm remote buffer overflow vulnerability.sem2005-08-241-0/+34 * Fix a typo in the new rc file, where documentation didn't match thegarga2005-08-226-6/+9 * Fix so the distfile can be manually fetched for package buildinglawrance2005-08-201-16/+11 * - Security update to version 2.0.1, fixing four denial of service bugs,garga2005-08-2021-168/+471 * Document four vulnerabilities in openvpn:remko2005-08-191-0/+123 * - Update to 0.6.1.sem2005-08-198-514/+55 * Update the MASTER_SITES. This is the only part of PR/84815 what wasjeh2005-08-181-1/+2 * Also mark phpAdsNew as affected by "pear-XML_RPC -- remote PHP codesimon2005-08-181-1/+6 * Add the fixed version so that people do not get a stale portaudit when the up...remko2005-08-181-7/+7 * Document tor -- diffie-hellman handshake flaw.remko2005-08-181-0/+31 * gpdf has been fixed for "xpdf -- disk fill DoS vulnerability", mark itsimon2005-08-171-0/+4 * Add eGroupWare to the list of packages affected by "pear-XML_RPC --simon2005-08-171-0/+6 * Document acroread -- plug-in buffer overflow vulnerability.simon2005-08-171-0/+42 * Add phpmyfaq and drupal to the "pear-XML_RPC -- remote PHP codesimon2005-08-161-1/+15 * Document pear-XML_RPC -- remote PHP code injection vulnerability.simon2005-08-151-0/+36 * Document awstats -- arbitrary code execution vulnerability.simon2005-08-151-0/+45 * After further examination it turns out that gnugadu does not includesimon2005-08-131-2/+1 * Remove pl-gnugadu2 and kadu from being affected by libgadu -- multiplesimon2005-08-121-5/+0 * Document libgadu -- multiple vulnerabilities.simon2005-08-121-0/+78 * Document gaim -- AIM/ICQ away message buffer overflow and gaim --simon2005-08-121-0/+65 * Remove pdftohtml from the list of packages affected by xpdf -- disksimon2005-08-121-4/+0 * Document xpdf -- disk fill DoS vulnerability.simon2005-08-121-0/+45 * Mark apache 1.3.33_2 as fixed for apache -- http request smuggling.simon2005-08-111-2/+3 * Fix ports/84648 (Interactive tripwire's database update does not work on 5.x).cy2005-08-112-1/+15 * Fix a fetch error.cy2005-08-111-1/+2 * Update twpol.txt to make it current with 5.X and beyond.cy2005-08-103-1/+13 * Document gforge -- XSS and email flood vulnerabilities.simon2005-08-091-0/+46 * Fix compilation on FreeBSD 6 or later in the WITH_PTH case.lofi2005-08-092-3/+117 * Document postnuke -- multiple vulnerabilities.simon2005-08-081-0/+47 * Document mambo -- multiple vulnerabilities.simon2005-08-051-0/+41 * Correct the ranges for the IPSec advisory and the devfs advisory.remko2005-08-051-3/+3 * Document some recent FreeBSD advisories:remko2005-08-051-0/+105 * Add some more entries to the apache -- http smuggling vulnerability.remko2005-08-041-2/+14 * Disable automatic tests on all versions of FreeBSD as they seem to fail inmarcus2005-08-041-4/+4 * Disable the automatic tests on 4.X. They are known to fail.marcus2005-08-041-1/+1 * Document proftpd -- format string vulnerabilities.simon2005-08-041-0/+37 * Note that the fix for gnupg -- OpenPGP symmetric encryptionsimon2005-08-041-0/+9 * Mark p5-Crypt-OpenPGP, pgp, and pgpin as vulnerable to gnupg --simon2005-08-031-0/+7 * Mark latest gdal version as fixed for all tiff vulnerabilities.simon2005-08-021-9/+24 * UPdate to DAT 4547jeh2005-08-022-3/+3 * Fix build failure on 4.x.kuriyama2005-08-012-0/+8 * Added nbsmtp format string vulnerability.niels2005-08-011-0/+28 * Mark latest the linux-tiff and pdflib ports safe from latest tiffsimon2005-08-011-1/+8 * Update to KDE 3.4.2 / KOffice 1.4.1lofi2005-08-012-4/+4 * Upgrade to 1.4.2.kuriyama2005-08-014-12/+10 * Re-add IGNORE message for Alpha < 500035.marcus2005-08-011-0/+4 * Update to 2.0.8.thierry2005-08-012-3/+3 * - Update to 0.97leeym2005-08-012-3/+3 * Document sylpheed -- MIME-encoded file name buffer overflowsimon2005-07-311-0/+31 * Document phpmyadmin -- cross site scripting vulnerability.simon2005-07-311-0/+30 * Document gnupg -- OpenPGP symmetric encryption vulnerability.simon2005-07-311-0/+37 * - Look for libraries in LOCALBASEsem2005-07-311-0/+1 * Bump entry date.remko2005-07-311-1/+1 * Document vim -- vulnerabilities in modeline handling: glob, expand.remko2005-07-311-0/+36 * - Update to 20050730sem2005-07-312-3/+3 * * Update to 3.10 [1]marcus2005-07-3110-30/+916 * Document that ekg -- insecure temporary file creation was fixed insimon2005-07-311-1/+2 * Just remove the user if BATCH is set in env, don't ask for users feedback.oliver2005-07-311-1/+1 * Add pdflib-perl, fractorama, gdal, iv, ivtools, ja-iv, ja-libimg,simon2005-07-311-3/+56 * Change MAINTAINER address for ports maintained by the Security Team tosimon2005-07-313-3/+3 * Document tiff -- buffer overflow vulnerability.simon2005-07-301-0/+39 * - Misc. markup/whitespace fixes.simon2005-07-301-39/+23 * Document jabberd vulnerabilities that were fixed by the latest update.vsevolod2005-07-301-0/+37 * Be consistent and use the same title for the latest etherealsimon2005-07-301-1/+1 * Document opera -- image dragging vulnerability and opera -- downloadsimon2005-07-301-0/+78 * Document ethereal -- multiple vulnerabilities.simon2005-07-301-0/+71 * Fix build on amd64 with -fPICvs2005-07-301-0/+4 * Pass maintainership to last submittergarga2005-07-291-1/+1 * - Update to 0.1.0.12garga2005-07-296-6/+8 * - Fix pkg-plist and Unbreak the portgarga2005-07-292-4/+10 * * Update second master sitejeh2005-07-292-4/+4 * This package implements an algorithm for breaking the PkZip cipher that wasgarga2005-07-284-0/+77 * - Fix apache 2.1 range for CAN-2005-2088 entry which prevents apache 2.0 fromclement2005-07-281-1/+4 * Update to 0.7.9.marcus2005-07-284-12/+16 * Mark apache+mod_ssl-1.3.33+2.8.22_1 as not vulnerable in the latest Apache en...remko2005-07-281-1/+2 * Patch MASTER_SITE since they seem to redirect to a second one sometimesjeh2005-07-281-1/+2 * - Fix startup script for miltersem2005-07-282-2/+3 * There must be an curse. s/il/li/.remko2005-07-281-7/+7 * Update my latest Apache entry to make clear that this only affects certainremko2005-07-281-1/+12 * update to DAT 4544jeh2005-07-282-3/+3 * Document apache -- http request smuggling.remko2005-07-271-0/+64 * Add courierpasswd, a user authentication and password changing utilityade2005-07-275-0/+56 * - Update to 1.7ahze2005-07-272-3/+3 * - Update to 1.2.8pav2005-07-273-15/+6 * Fix URL of project web site.se2005-07-271-1/+1 * Update to DAT 4543jeh2005-07-272-3/+3 * TLSWrap is a TLS/SSL FTP wrapper/proxy for UNIX and Windows, allowing you togarga2005-07-274-0/+49 * New port: Yersiniase2005-07-278-0/+386 * BSDsfv is a flexible and highly compatible SFV checksum utility.garga2005-07-274-0/+52 * This utility creates .SFV (Simple File Verify) and .PAR (Parity Archive) datagarga2005-07-274-0/+56 * Set modified date in entry for previous commit.erwin2005-07-261-0/+1 * Note that the fd_set vulnerability in net/bld was fixed in 0.3.3erwin2005-07-261-1/+4 * Document clamav -- multiple remote buffer overflows.hrs2005-07-251-0/+46 * - Update to 0.86.2sem2005-07-252-3/+3 * Update to 4541jeh2005-07-252-3/+3 * Don't overwrite installed aide.conf by using -f FILEnork2005-07-241-1/+1 * Update to 2.2.5.mezz2005-07-249-1081/+95 * update to 0.57oliver2005-07-234-31/+63 * - update distinfoleeym2005-07-231-2/+2 * - Document isc-dhcpd -- format string vulnerabilities (oldersimon2005-07-231-1/+37 * This port is scheduled for deletion on 2005-09-22 if it is still brokenkris2005-07-231-0/+2 * Add entry for eGroupWare's recent vulnerabilities.kuriyama2005-07-231-0/+31 * Document denial of service attack in fetchmail 6.5.2.1.barner2005-07-221-0/+30 * Update my email address.vsevolod2005-07-227-7/+7 * Update phppgadmin entry to note that it was fixed in 3.5.4 and add asimon2005-07-221-1/+4 * Change MASTERSITE from ~renato to ~garga because I change my accountgarga2005-07-221-1/+1 * Document dnrd -- remote buffer and stack overflow vulnerabilities.simon2005-07-221-0/+33 * Fix typo in last commitsimon2005-07-211-1/+1 * Add more references to latest fetchmail entry [1] and sort referencessimon2005-07-211-1/+4 * - Fix a bug in SHA256sem2005-07-212-0/+12 * - Update to 1.3.5pav2005-07-215-44/+10 * Document an issue with the LDAP backend provided by PowerDNS.trhodes2005-07-211-0/+30 * BROKEN on !i386: Does not compilekris2005-07-211-0/+4 * Document fetchmail -- remote root/code injection from malicious POP3simon2005-07-211-0/+28 * Bridge betwean ClamAV antivirus software and Squid caching proxy.garga2005-07-216-0/+129 * s/freebsd.org/FreeBSD.org/marcus2005-07-211-1/+1 * - Revive security/ruby-acl port and unbreak itpav2005-07-206-0/+82 * - Fix plist and unbreak [1, 2]pav2005-07-204-17/+20 * - Update to 2.0.8pav2005-07-209-6/+12 * - Update to 2.0.8pav2005-07-209-9/+12 * - Update to 1.1pav2005-07-203-4/+7 * - Update to 0.3.1novel2005-07-204-6/+15 * Update to 4538jeh2005-07-202-3/+3 * - Update to 1.4.2pav2005-07-192-4/+4 * - Use PLIST_FILESpav2005-07-193-2/+4 * o add kdebase (kate) vulnarability.mich2005-07-191-0/+33 * - Update to 0.2.1pav2005-07-192-4/+4 * - Update to 1.4pav2005-07-192-11/+8 * Update to 4537jeh2005-07-192-3/+3 * This module brings to Python programs the capability of evaluating passwordpav2005-07-195-0/+58 * - fix manpagesdinoex2005-07-181-2/+0 * Add CVE names to recent bugzilla entry.simon2005-07-181-0/+3 * - Update to 0.9.2pav2005-07-183-3/+23 * Make sure LATEST_LINK is unique from that of the calife-nondevel port.adamw2005-07-181-0/+2 * With portmgr hat on, reset eik's ports since he has been inactive forlinimon2005-07-182-2/+2 * - fix installation of start script on 4.xleeym2005-07-181-0/+5 * Fix alignment problems on non-i386 platforms.marcus2005-07-176-58/+56 * - Document firefox & mozilla -- multiple vulnerabilities.simon2005-07-161-1/+126 * make it compile on 7oliver2005-07-161-2/+2 * Add an entry for the drupal vulnerabilities.erwin2005-07-161-0/+27 * Update to 4536jeh2005-07-162-3/+3 * Fixed incorrect newsfetch and mnogosearch affected package versionsniels2005-07-151-2/+2 * Update to 2.3.1.mezz2005-07-1510-4014/+385 * Update to 4535jeh2005-07-152-3/+3 * NewPKI is a PKI based on the OpenSSL low-level API, all the datas are handledpav2005-07-147-0/+100 * NewPKI is a PKI based on the OpenSSL low-level API, all the datas are handledpav2005-07-145-0/+126 * Add PW_PASS option to compile with --enable-pass-savegarga2005-07-143-3/+27 * NewPKI is a PKI based on the OpenSSL low-level API, all the datas are handledpav2005-07-147-0/+147 * Mark broken on 4.xlawrance2005-07-141-1/+7 * - Update to 0.11.flz2005-07-142-4/+4 * - Update to 0.9.flz2005-07-142-6/+3 * Update to 4534jeh2005-07-142-3/+3 * Update to stunnel 4.11, which is deemed a stable release.roam2005-07-134-70/+11 * Markup fixed version of net-snmp problem.kuriyama2005-07-131-1/+2 * Fix:cy2005-07-1312-0/+120 * - Let configure know that we have fnmatch.h (fixes some fnmatch-usingjylefort2005-07-132-9/+9 * Update to DAT 4533jeh2005-07-132-3/+3 * Update to the latest hpn-ssh patches for 3.9p1. The previous patchesbrooks2005-07-122-12/+8 * Change MAINTAINER to my @FreeBSD.org accountgarga2005-07-123-3/+3 * Update to DAT 4532jeh2005-07-122-3/+3 * - Sync with master port updatesem2005-07-115-71/+49 * - Update to latest NetBSD snapshotsem2005-07-1128-10882/+7 * Make compilable on 64bit system.sumikawa2005-07-111-0/+20 * - Update to 0.46clement2005-07-112-4/+4 * Replace master site with working oneskris2005-07-111-1/+3 * - update to 0.9.8 for WITH_OPENSSL_BETA=yesdinoex2005-07-1111-5/+417 * Chase master sitekris2005-07-111-1/+1 * Update to nikto-1.35 to fix fetchingkris2005-07-112-3/+3 * - Update to 1.1.0-7 in order to fix fetching. For a list of changes seemarius2005-07-1010-56/+393 * - Was marked as unmaintained by accident.sem2005-07-101-1/+1 * Correct a typo: s/lemote/remote/remko2005-07-101-1/+1 * Document the following vulnerabilities:remko2005-07-101-0/+159 * Update to Gaim 1.4.0. See http://gaim.sourceforge.net/ChangeLog formarcus2005-07-094-2/+4 * Document phppgadmin -- "formLanguage" local file inclusion vulnerability.simon2005-07-091-0/+34 * Document pear-XML_RPC -- information disclosure vulnerabilities.simon2005-07-09