aboutsummaryrefslogtreecommitdiff
path: root/security
Commit message (Expand)AuthorAgeFilesLines
* - Update to 11.0.0Sofian Brabez2011-09-072-4/+7
* Update to 0.5.Roman Bogorodskiy2011-09-073-3/+12
* - Switch to using bsd.port.options.mk.Wesley Shields2011-09-071-2/+2
* - Chase devel/google-perftools shlib bumpPawel Pekala2011-09-062-0/+4
* - Correct massh.conf handlingPav Lucistnik2011-09-062-0/+3
* fix last thunderbird entryFlorian Smeets2011-09-061-1/+2
* add firefox, thunderbird and seamonkey to the DigiNotar.nl entryFlorian Smeets2011-09-061-0/+26
* Fix clang build.Xin LI2011-09-062-0/+98
* - Update to 1.8.2Wesley Shields2011-09-063-7/+28
* Apply patch from MIT KRB5 GIT tree commit: 043533c2f13d2bc69316.Cy Schubert2011-09-062-0/+22
* - Update to 0.17Ashish SHUKLA2011-09-062-3/+5
* - Revert part of previous commit, perl is still needed to buildPav Lucistnik2011-09-051-1/+1
* Update to 1.2.0Martin Matuska2011-09-052-3/+3
* Fix vuln.xml, while here fix indentationBaptiste Daroussin2011-09-051-22/+25
* - Update to 1.2.7Eitan Adler2011-09-051-0/+24
* - Fix errors in portEitan Adler2011-09-051-2/+3
* - Document cfs buffer overflow vulnerability.Chris Rees2011-09-041-8/+35
* Massh makes it possible to perform the following on hundreds, or evenEitan Adler2011-09-045-0/+80
* - After more research, mark FORBIDDEN -- vulnerable to buffer overflows.Chris Rees2011-09-041-3/+3
* Mark deprecated; broken for two years with no fix.Chris Rees2011-09-041-0/+4
* Update Nettle to 2.4 (bugfix release)Johan van Selst2011-09-043-4/+4
* Change extract program:Matthias Andree2011-09-041-4/+30
* Mark MAKE_JOBS_UNSAFE.Matthias Andree2011-09-041-0/+1
* See to proper version tags in the bundle .pem file.Matthias Andree2011-09-042-3/+6
* Revise nss/ca_root_nss working around Mozilla,Matthias Andree2011-09-041-2/+35
* Security update: use newer Mozilla Builtin-Trust storeMatthias Andree2011-09-044-66/+177
* - Add a new port: security/R-cran-ROAuthTAKATSU Tomonari2011-09-044-0/+33
* - Add a new port: security/R-cran-digestTAKATSU Tomonari2011-09-044-0/+40
* - Correct affected plone versionsSunpoet Po-Chuan Hsieh2011-09-041-2/+2
* - Update to 1.71Sunpoet Po-Chuan Hsieh2011-09-042-14/+19
* - bump modifiled for CVE-2007-5137Dirk Meyer2011-09-041-1/+1
* - Add p5-Crypt-OpenSSL-CA 0.21Sunpoet Po-Chuan Hsieh2011-09-035-0/+86
* - update CVE-2007-5137Dirk Meyer2011-09-031-7/+2
* Update range to exclude nss 3.12.11 from vuln, as kwm@'s commitMatthias Andree2011-09-031-1/+1
* Update to 3.12.11.Koop Mast2011-09-032-5/+8
* Add a security notice for the DigiNotar incident, listing nss/ca_root/nss.Matthias Andree2011-09-031-0/+64
* - only match vulnerable versions in the hlstats entryFlorian Smeets2011-09-031-1/+5
* Mark vulnerable ports FORBIDDEN with EXPIRATION_DATE= 2011-09-30Doug Barton2011-09-031-0/+3
* - Update nettle to 2.3Johan van Selst2011-09-033-4/+8
* Bring COPS back from the dead.Cy Schubert2011-09-031-0/+1
* Bring this old-school tool back from the dead.Cy Schubert2011-09-036-0/+338
* Add EXPIRATION to ports marked DEPRECATED that do not already have it. [1]Doug Barton2011-09-031-1/+1
* Final modification for apache22 vulnerability; include slave ports as wellChris Rees2011-09-021-0/+5
* Correct range for apache22, 2.2.20 is fixed and 1.3 wasn't affected.Chris Rees2011-09-011-2/+1
* - Update to 0.9.9Sunpoet Po-Chuan Hsieh2011-09-019-68/+26
* - remove dead mirrorStefan Walter2011-09-013-50/+47
* - Update to 1.18Ganael LAPLANCHE2011-09-013-5/+21
* Fix build under 9.0-CURRENT.Cy Schubert2011-09-015-13/+159
* - Update to 0.4.2.1Dennis Herrmann2011-08-315-31/+22
* - Update to 0.21Sylvio Cesar Teixeira2011-08-312-3/+3