aboutsummaryrefslogtreecommitdiffstats
path: root/misc/kde3-i18n-ven
ModeNameSize
-rw-r--r--Makefile718logstatsplainblame
-rw-r--r--distinfo254logstatsplainblame
-rw-r--r--pkg-descr74logstatsplainblame
-rw-r--r--pkg-plist18062logstatsplainblame
d-ports-gnome/commit/security?h=gnome-3.24&id=9f9ad37e6aa2a8d64e003403907c79a9ee0557c4'>- Update to 1.9.2pav2005-11-213-7/+13 * - Remove security/prelude-nids and refer users to security/snort instead:sergei2005-11-217-166/+0 * - Disconnect security/prelude-nids from the parent Makefilesergei2005-11-211-1/+0 * - update to 0.50clsung2005-11-212-5/+6 * BROKEN: Unfetchablekris2005-11-211-0/+2 * - update default build options on aplhadinoex2005-11-191-1/+1 * - backout last patchdinoex2005-11-191-40/+26 * - update default build options on aplhadinoex2005-11-191-26/+40 * Switch to <target>:: convention for both patch-autotools and run-autotools,ade2005-11-191-1/+1 * Update to DAT 4631jeh2005-11-192-4/+4 * Update to 0.12mnag2005-11-182-3/+5 * Racoon is now maintained in security/ipsec-tools.sumikawa2005-11-1811-205/+0 * Update 1.4.2 --> 1.4.3cy2005-11-188-16/+12 * Update to DAT 4631jeh2005-11-182-4/+4 * - Update to 1.0.3pav2005-11-184-25/+18 * - Update MASTER_SITESpav2005-11-186-32/+36 * - update to 1.4.9clsung2005-11-173-5/+10 * Update to DAT 4630jeh2005-11-172-4/+4 * Update to DAT 4629jeh2005-11-172-4/+4 * phpmyadmin -- HTTP Response Splitting vulnerabilitymnag2005-11-161-0/+32 * Update to DAT 4628jeh2005-11-162-4/+4 * - Move securiy/hping -> net/hpingaz2005-11-157-126/+0 * Mass-conversion to the USE_AUTOTOOLS New World Order. The code presentade2005-11-1568-83/+69 * OKEN: Size mismatchkris2005-11-151-0/+2 * - Update to 0.4.6ahze2005-11-154-8/+8 * Now that bsdiff is part of the base system and conditional IGNORE=cperciva2005-11-151-2/+7 * Website movedache2005-11-152-3/+4 * Update to DAT 4627jeh2005-11-152-4/+4 * Update to DAT 4626jeh2005-11-152-3/+4 * libnet update:sem2005-11-1512-14/+39 * Add CVE name to an old sudo entry.simon2005-11-151-0/+2 * Take a perl@ hat and add SHA256 checksumsmat2005-11-1414-0/+14 * Be hipe and add SHA256mat2005-11-142-0/+2 * - Fix permission of 002.drweb-smf.sh start scriptgarga2005-11-141-1/+1 * Remove explicit checks for /usr/bin/bzip2.edwin2005-11-141-3/+0 * Update latest phpSysInfo entry to reflect that 2.4 was in fact not fixedsimon2005-11-141-1/+2 * Upgrade to 0.13mharo2005-11-142-4/+5 * Upgrade to 1.25mharo2005-11-142-3/+3 * Upgrade to 1.6.8.12mharo2005-11-142-5/+4 * Add SHA256ade2005-11-141-0/+1 * Reset undeliverable maintainer address (past 1 month):kris2005-11-141-2/+2 * Reset undeliverable maintainer address:kris2005-11-141-1/+1 * Update to 2.0.10mnag2005-11-149-9/+39 * Update to 2.0.10mnag2005-11-149-6/+18 * - Micromedia -> Macromediasem2005-11-141-6/+6 * - Document phpSysInfo vulnerabilitysem2005-11-141-0/+34 * - Document flashplugin vulnerabilitysem2005-11-141-0/+43 * Add SHA256mnag2005-11-141-0/+1 * Add SHA256mnag2005-11-141-0/+2 * Update to 20051112mnag2005-11-142-3/+5 * Update to 1.3.1mnag2005-11-143-4/+15 * Add amavisd-milter 1.0.2, milter for amavisd-new.lawrance2005-11-147-0/+107 * - add SHA checksumdinoex2005-11-133-2/+6 * - Update to 1.2pav2005-11-135-15/+43 * Move IDN related ports from devel to dns category:pav2005-11-132-2/+2 * - Install man pagesem2005-11-132-1/+7 * Sud is a daemon to execute interactive and non-interactive processes withpav2005-11-125-0/+62 * activate use of USE_SQLITE.ume2005-11-121-2/+1 * Update to 2.6.1mnag2005-11-122-9/+10 * add SHA256brooks2005-11-121-0/+1 * Add security/p5-Authen-Htpasswd 0.12, a Perl module to read and modifytobez2005-11-115-0/+56 * This port installs a 5.x binary, so depend on the compat5x port onarved2005-11-111-0/+4 * - Yield to a total SHAtification.sem2005-11-111-0/+1 * Add denyhosts 1.1.2, script to thwart ssh attacks.vanilla2005-11-118-0/+216 * Add SHA256 checksumlioux2005-11-113-0/+3 * Add CONFLICTS= ipsec-tools-[0-9]*.sumikawa2005-11-111-0/+2 * With portmgr hat on, reset maintainership of knu's ports since he haslinimon2005-11-119-9/+9 * - Add SHA256 to all ports submitter maintaingarga2005-11-113-0/+3 * - CATEGORY CHANGE: add "net" secondary categorygarga2005-11-1015-66/+93 * - Document p5-Mail-SpamAssassin vulnerabily (alread fixed in ports)sem2005-11-101-0/+66 * Update to 4.33mnag2005-11-106-362/+248 * Update to DAT 4624jeh2005-11-102-3/+3 * Update to DAT 4623jeh2005-11-102-3/+3 * - Respect non-standard LOCALBASEgarga2005-11-101-4/+3 * - Add SHA256garga2005-11-101-0/+1 * - Add SHA256 checksums.flz2005-11-091-0/+1 * Move instant messaging related ports to newly created net-im category:pav2005-11-094-10/+10 * Add SHA256mnag2005-11-093-0/+4 * Update to 4.33mnag2005-11-097-382/+217 * Fix order in rc script to prevent errorsmnag2005-11-093-7/+13 * Update to 2.2.6mnag2005-11-099-244/+96 * Fix FreeBSD-4.11 build problemcy2005-11-098-20/+60 * Fix LOCALBASE issue.skv2005-11-091-0/+1 * Update the recent gallery2 and webcalendar entries:remko2005-11-091-5/+14 * - use USB_BDB.ume2005-11-093-20/+10 * - Add SHA256garga2005-11-084-0/+5 * Add SHA256 checksums for my portsarved2005-11-082-0/+2 * Document qpopper -- multiple privilege escalation vulnerabilities.remko2005-11-081-0/+32 * Update to DAT 4622jeh2005-11-082-3/+3 * install missed components.html document.ume2005-11-072-3/+5 * - Update to 2.5ehaupt2005-11-073-9/+53 * - Update to 20051104garga2005-11-072-3/+3 * - Add missed </p> tag [1]sem2005-11-071-2/+3 * Update to DAT 4621jeh2005-11-062-3/+3 * Chase gpgme updateoliver2005-11-061-2/+2 * Update to 0.87.1mnag2005-11-053-20/+3 * Update to KDE 3.4.3 / KOffice 1.4.2lofi2005-11-052-4/+4 * Update gpgme to 1.0.3 and chase shared library version bump.lofi2005-11-057-114/+19 * Chase glib20 and libsoup shared library version.marcus2005-11-051-1/+7 * Bump PORTREVISION to chase the glib20 shared library update.marcus2005-11-0524-15/+24 * Presenting GNOME 2.12 for FreeBSD. The release is chock full of bug fixesmarcus2005-11-0518-136/+216 * Enables self-tests with WITH_JAILmnag2005-11-056-6/+192 * Change MAINTAINERship to perl@.nork2005-11-052-2/+2 * Add a bit more info from the PEAR advisory about the vulnerability tosimon2005-11-051-0/+4 * The two latest OpenVPN vulnerabilities were both only for 2.0 andsimon2005-11-051-2/+4 * Drop maintainerjesper2005-11-052-2/+2 * Add an entry for pear-PEAR arbitrary code execution vulnerability.thierry2005-11-051-0/+28 * Fix plist.sumikawa2005-11-042-1/+3 * - Update to 2.0.5garga2005-11-039-9/+66 * Update to 0.6.0mnag2005-11-033-13/+11 * Drop INSTALLS_SHLIB/LDCONFIG_DIRS: Local shlibs are dlopenedvs2005-11-031-2/+0 * Update to stunnel 4.14, which is mostly a bugfix release.roam2005-11-035-3/+39 * Update to DAT 4617jeh2005-11-032-3/+3 * make security/cyrus-sasl2-ldapdb buildable with OpenLDAP 2.3.ume2005-11-031-1/+10 * Correct skype entry to match the correct fixed port version number.simon2005-11-021-1/+2 * Upgrade to 20051102a.sumikawa2005-11-025-48/+18 * Update to 2.0.4mnag2005-11-029-78/+15 * Assign maintainership to original submitter of this port.linimon2005-11-021-1/+1 * Document two OpenVPN vulnerabilities.simon2005-11-021-0/+67 * As Peter Jeremy points out, the recent lynx vulnerability also concernsnaddy2005-11-021-0/+5 * Change maintainer's emailmnag2005-11-021-1/+1 * Update maintainer's emailmnag2005-11-022-4/+4 * - Update maintainer's email addresspav2005-11-022-4/+4 * Upgrade to latest version.vanilla2005-11-024-26/+4 * Fix fetchingarved2005-11-01