summaryrefslogtreecommitdiffstats
path: root/ports-mgmt
Commit message (Expand)AuthorAgeFilesLines
* add MySQL server authentication bypass / buffer overfloweik2004-07-051-0/+2
* Mark 4aec9d58-ce7b-11d8-858d-000d610a3b12 as a duplicate of theeik2004-07-053-1/+28
* Perform plist substitution for -L.des2004-07-052-3/+10
* Move phpnuke vulnerabilities to VuXML.trhodes2004-07-031-1/+0
* Use full path to portsdb instead of assuming ${LOCALBASE}/sbin is in PATHkris2004-07-021-2/+2
* Apply a patch to avoid "undefined method `each' for nil:NilClass"knu2004-07-024-0/+34
* move "phpMyAdmin code injection" to vuxmleik2004-07-021-1/+0
* Test OSVERSION instead of pkg_info -P to enable cross-version buildseik2004-07-022-9/+11
* phpMyAdmin code injectioneik2004-07-011-0/+1
* - update to version 0.5eik2004-07-0110-554/+442
* Update to 20040701. New distfile.knu2004-07-016-54/+10
* - SSLtelnet remote format string vulnerabilityeik2004-06-301-7/+8
* update to 20040629: sync with -CURRENTeik2004-06-303-5/+33
* add MIT Kerberos 5 krb5_aname_to_localname() buffer overfloweik2004-06-291-0/+1
* add isakmpd security association deletion vulnerabilityeik2004-06-291-2/+3
* add Apache input header folding DoS vulnerabilityeik2004-06-281-0/+1
* xine-lib RTSP handling vulnerabilitieseik2004-06-281-0/+1
* Move MoinMoin entry to VuXML.trhodes2004-06-281-1/+0
* diversify url conversioneik2004-06-281-1/+21
* Update to 2.6.6marcus2004-06-272-10/+115
* add portaudit2vuxml.pl to easy the migration of entries to VuXMLeik2004-06-261-0/+129
* Add an entry for recent isc-dhcp3-server buffer overflows.trhodes2004-06-251-1/+0
* Move giFT-FastTrack to VuXML.trhodes2004-06-251-1/+0
* giFT-FastTrack remote DoSeik2004-06-251-0/+1
* Add patch with bugfixes.mich2004-06-252-1/+48
* Update to 0.2.2eik2004-06-254-7/+10
* correct rlpr versioneik2004-06-251-2/+2
* Pure-FTPd DoS when the max number of connection is reachedeik2004-06-251-0/+1
* Move the Gallery entry to VuXML.trhodes2004-06-251-1/+0
* update to version 0.4.1eik2004-06-253-2/+30
* rlpr local and remote exploitable buffer overflow (CAN-2004-0393, CAN-2004-0454)eik2004-06-241-0/+1
* CAN-2004-0451: format string vulnerabilities in supeik2004-06-241-0/+1
* Security flaw in rssheik2004-06-241-1/+2
* Icecast remote DoS vulnerabilityeik2004-06-241-0/+1
* Add pkg-req file which was forgotten in the last commit.eik2004-06-231-0/+27
* Update to version 0.4, with a new `-f' option.eik2004-06-233-42/+91
* update to version 20040623, which has a new `filter mode' for pkg_version -T.eik2004-06-232-3/+3
* it seems like isc-dhcp3-{client,devel} are unaffectedeik2004-06-231-1/+1
* reword gallery entryeik2004-06-231-1/+4
* Update of port which supports FreeBSD-5 alike INDEX-5 file parsingeik2004-06-222-1/+21
* Sqwebmail 4.0.4 XSS vulnerabilityeik2004-06-221-0/+1
* Oops, the previous patch was bogus. Sorry.knu2004-06-224-24/+18
* Upgrade to version 0.4lofi2004-06-212-3/+3
* Roundup remote file disclosure vulnerabilityeik2004-06-211-0/+1
* Support the new, extended INDEX format.knu2004-06-214-0/+40
* make expiry date customizable via daily_status_portaudit_expiryeik2004-06-213-3/+3
* mailman allows 3rd parties to retrieve member passwords (CAN-2004-0412)weik2004-06-211-0/+1
* super format string vulnerabilityeik2004-06-211-0/+1
* Scorched 3D server chat box format string vulnerabilityeik2004-06-211-0/+1
* BNBT Authorization Header DoSeik2004-06-211-0/+1
OpenPOWER on IntegriCloud