summaryrefslogtreecommitdiffstats
path: root/security
Commit message (Expand)AuthorAgeFilesLines
* Document vulnerability in net/jabberd.josef2004-11-301-0/+27
* update to version 3.77eik2004-11-305-6/+6
* build & install two useful programs; testsaslauthd and saslcache.ume2004-11-302-1/+9
* Chase MASTER_SITESvs2004-11-301-1/+2
* Update to 1.6.8p5mharo2004-11-302-4/+4
* Fix build with native java.krion2004-11-291-0/+13
* Document vulnerability in net/opendchub.josef2004-11-291-0/+26
* - Teach configure about ia64 platform (similar to the recent amd64 fix)sergei2004-11-292-7/+8
* Update to 0.2.2krion2004-11-294-3/+8
* Add Bugtraq ID for SA-04:16.fetch entry.simon2004-11-281-0/+1
* remove needless definition.ume2004-11-282-10/+0
* cyrus-sasl2-saslauthd couldn't be built with system OpenSSL and BDB42.ume2004-11-282-2/+12
* - Update to 0.5sem2004-11-275-6/+28
* Update to 4.1.1krion2004-11-274-23/+15
* Update: security/osiris 4.0.5 -> 4.0.6edwin2004-11-273-12/+3
* New port: security/pear-Crypt_RC4 PEAR encryption class for RC4 encryptionedwin2004-11-274-0/+29
* Document two vulnerabilities in unarj.simon2004-11-261-0/+53
* . Mark linux-ibm-jdk as also vulnerable to the Java plugin vulnerability.glewis2004-11-251-0/+4
* Update to 0.6.8lofi2004-11-253-3/+13
* . Fix the range and add an additional range for the jdk vulnerability.glewis2004-11-251-1/+12
* . Fix whitespace.glewis2004-11-251-6/+6
* . Add an entry for the problem in the Java plugin.glewis2004-11-251-0/+31
* Update ruby CGI DoS entry to note that the most recent version insimon2004-11-251-2/+3
* Document vulnerability in ftp/prozilla.josef2004-11-251-0/+27
* - Update to 4.32.1sem2004-11-258-411/+322
* - Change Ocaml build dependency to a lighter lang/ocaml-nox11sergei2004-11-255-5/+48
* - Update to 4.32.2sem2004-11-247-172/+160
* Update to DAT 4410jeh2004-11-242-3/+3
* [MAINTAINER] security/f-prot: Make dependency on signatures optionaldaichi2004-11-241-3/+16
* Fix build with gssapi and krb5ume2004-11-242-2/+2
* correct fixed versionume2004-11-241-2/+2
* c0a269d5-3d16-11d9-8818-008088034841 andume2004-11-241-2/+6
* security/sudoscript to 2.1.2; fixes security bugdaichi2004-11-243-32/+31
* IGNORE: Changes the permissions on ${LOCALBASE}/binkris2004-11-241-0/+2
* - Standardize an EXPIRATION_DATE format.sem2004-11-241-1/+1
* BROKEN: Unfetchablekris2004-11-231-0/+2
* Maintainer no longer uses this software.linimon2004-11-231-1/+1
* Update to 0.3.2vs2004-11-234-39/+3
* Document that the twiki vulnerability is fixed in twiki-20040902.simon2004-11-231-1/+2
* add Cyrus IMAP Server multiple remote vulnerabilities.ume2004-11-231-0/+134
* Obfuscates email addresses.sem2004-11-226-0/+52
* Fixed memory leak.sumikawa2004-11-224-0/+86
* Update to version 0.0.20krion2004-11-222-3/+3
* I can't believe I had that link line backwards and I tested it. Anywaysjeh2004-11-221-2/+3
* Update to 0.0.15krion2004-11-222-3/+3
* Fix WWW: line.krion2004-11-211-1/+1
* Upgrade to version 4.40ejeh2004-11-213-25/+28
* - Update to 0.99pav2004-11-213-3/+5
* Add CVE reference for the SA-04:16.fetch entry.simon2004-11-201-0/+1
* - uvscan depends on libm.so.2jeh2004-11-202-8/+18
OpenPOWER on IntegriCloud