summaryrefslogtreecommitdiffstats
path: root/security
Commit message (Expand)AuthorAgeFilesLines
* Upgrade to 2.0.4.vanilla2004-12-059-12/+36
* Upgrade to 2.0.4.vanilla2004-12-059-24/+33
* Bump PORTREVISION for previous commitjesper2004-12-051-0/+1
* Fix PLIST_FILES and PLIST_DIRSjesper2004-12-051-1/+3
* . Put the topic in the same format all other recent topics have been in forglewis2004-12-051-1/+6
* - update to 1.38clsung2004-12-052-3/+3
* Add cvename to bnc vulnerability.simon2004-12-041-0/+1
* Document a remote code execution vulnerability in bnc.simon2004-12-041-0/+34
* Chase the gaim-1.1.0 update.marcus2004-12-042-2/+2
* Fix grammar nit in ImageMagick entry.simon2004-12-041-1/+1
* For the Java plugin vulnerability, also match the linux-jdk packagesimon2004-12-041-1/+2
* Update to 1.9.13lofi2004-12-043-3/+4
* - Chase permanent redirectionpav2004-12-032-4/+2
* . Note that although linux-sun-jdk13 had one plugin vulnerability fixedglewis2004-12-031-1/+1
* Add ipv6 on CATEGORIES.sumikawa2004-12-032-2/+2
* Update to 0.9.10lofi2004-12-032-4/+4
* Update to 20041201 snapshot.ale2004-12-033-7/+28
* Document vulnerability that allows arbitrary command execution in rsshrushani2004-12-031-0/+33
* Document buffer overflows in rockdodger.naddy2004-12-021-0/+27
* - Add missed filesem2004-12-021-0/+20
* Add CVE to zip vulnerability.simon2004-12-011-0/+1
* Document a long path buffer overflow in zip.simon2004-12-011-0/+33
* update to 4411jeh2004-12-012-3/+3
* Document signal delivery vulnerability in sudoscript.simon2004-12-011-0/+23
* remove rubbish from the broken Makefileedwin2004-12-011-101/+0
* New port: security/pear-LiveUser PEAR user authentication andedwin2004-12-015-0/+217
* Document vulnerability in net/jabberd.josef2004-11-301-0/+27
* update to version 3.77eik2004-11-305-6/+6
* build & install two useful programs; testsaslauthd and saslcache.ume2004-11-302-1/+9
* Chase MASTER_SITESvs2004-11-301-1/+2
* Update to 1.6.8p5mharo2004-11-302-4/+4
* Fix build with native java.krion2004-11-291-0/+13
* Document vulnerability in net/opendchub.josef2004-11-291-0/+26
* - Teach configure about ia64 platform (similar to the recent amd64 fix)sergei2004-11-292-7/+8
* Update to 0.2.2krion2004-11-294-3/+8
* Add Bugtraq ID for SA-04:16.fetch entry.simon2004-11-281-0/+1
* remove needless definition.ume2004-11-282-10/+0
* cyrus-sasl2-saslauthd couldn't be built with system OpenSSL and BDB42.ume2004-11-282-2/+12
* - Update to 0.5sem2004-11-275-6/+28
* Update to 4.1.1krion2004-11-274-23/+15
* Update: security/osiris 4.0.5 -> 4.0.6edwin2004-11-273-12/+3
* New port: security/pear-Crypt_RC4 PEAR encryption class for RC4 encryptionedwin2004-11-274-0/+29
* Document two vulnerabilities in unarj.simon2004-11-261-0/+53
* . Mark linux-ibm-jdk as also vulnerable to the Java plugin vulnerability.glewis2004-11-251-0/+4
* Update to 0.6.8lofi2004-11-253-3/+13
* . Fix the range and add an additional range for the jdk vulnerability.glewis2004-11-251-1/+12
* . Fix whitespace.glewis2004-11-251-6/+6
* . Add an entry for the problem in the Java plugin.glewis2004-11-251-0/+31
* Update ruby CGI DoS entry to note that the most recent version insimon2004-11-251-2/+3
* Document vulnerability in ftp/prozilla.josef2004-11-251-0/+27
OpenPOWER on IntegriCloud