summaryrefslogtreecommitdiffstats
path: root/security
Commit message (Expand)AuthorAgeFilesLines
* - Update to 0.5sem2004-11-275-6/+28
* Update to 4.1.1krion2004-11-274-23/+15
* Update: security/osiris 4.0.5 -> 4.0.6edwin2004-11-273-12/+3
* New port: security/pear-Crypt_RC4 PEAR encryption class for RC4 encryptionedwin2004-11-274-0/+29
* Document two vulnerabilities in unarj.simon2004-11-261-0/+53
* . Mark linux-ibm-jdk as also vulnerable to the Java plugin vulnerability.glewis2004-11-251-0/+4
* Update to 0.6.8lofi2004-11-253-3/+13
* . Fix the range and add an additional range for the jdk vulnerability.glewis2004-11-251-1/+12
* . Fix whitespace.glewis2004-11-251-6/+6
* . Add an entry for the problem in the Java plugin.glewis2004-11-251-0/+31
* Update ruby CGI DoS entry to note that the most recent version insimon2004-11-251-2/+3
* Document vulnerability in ftp/prozilla.josef2004-11-251-0/+27
* - Update to 4.32.1sem2004-11-258-411/+322
* - Change Ocaml build dependency to a lighter lang/ocaml-nox11sergei2004-11-255-5/+48
* - Update to 4.32.2sem2004-11-247-172/+160
* Update to DAT 4410jeh2004-11-242-3/+3
* [MAINTAINER] security/f-prot: Make dependency on signatures optionaldaichi2004-11-241-3/+16
* Fix build with gssapi and krb5ume2004-11-242-2/+2
* correct fixed versionume2004-11-241-2/+2
* c0a269d5-3d16-11d9-8818-008088034841 andume2004-11-241-2/+6
* security/sudoscript to 2.1.2; fixes security bugdaichi2004-11-243-32/+31
* IGNORE: Changes the permissions on ${LOCALBASE}/binkris2004-11-241-0/+2
* - Standardize an EXPIRATION_DATE format.sem2004-11-241-1/+1
* BROKEN: Unfetchablekris2004-11-231-0/+2
* Maintainer no longer uses this software.linimon2004-11-231-1/+1
* Update to 0.3.2vs2004-11-234-39/+3
* Document that the twiki vulnerability is fixed in twiki-20040902.simon2004-11-231-1/+2
* add Cyrus IMAP Server multiple remote vulnerabilities.ume2004-11-231-0/+134
* Obfuscates email addresses.sem2004-11-226-0/+52
* Fixed memory leak.sumikawa2004-11-224-0/+86
* Update to version 0.0.20krion2004-11-222-3/+3
* I can't believe I had that link line backwards and I tested it. Anywaysjeh2004-11-221-2/+3
* Update to 0.0.15krion2004-11-222-3/+3
* Fix WWW: line.krion2004-11-211-1/+1
* Upgrade to version 4.40ejeh2004-11-213-25/+28
* - Update to 0.99pav2004-11-213-3/+5
* Add CVE reference for the SA-04:16.fetch entry.simon2004-11-201-0/+1
* - uvscan depends on libm.so.2jeh2004-11-202-8/+18
* Update to 20041119krion2004-11-202-3/+3
* Update to 4.4.8krion2004-11-202-3/+3
* With portmgr hat on, reset inactive maintainer. These ports are now uplinimon2004-11-201-1/+1
* Document vulnerability in phpmyadmin.josef2004-11-201-0/+25
* Update to DAT 4409jeh2004-11-192-3/+3
* Update to 0.2.1krion2004-11-192-3/+3
* Update to 2.4.3krion2004-11-182-3/+3
* Add localized versions of gd port to the VuXML entry.josef2004-11-181-0/+2
* - Update to 0.31 (see http://untroubled.org/cvm/NEWS for details)sergei2004-11-183-3/+12
* Document SA-04:16.fetch.simon2004-11-181-0/+36
* Update to 1.5mat2004-11-182-3/+3
* Update to DAT 4408jeh2004-11-182-3/+3
OpenPOWER on IntegriCloud