FreshPorts -- The Place For Ports If you buy from Amazon USA, please support us by using this link.
Follow us
Blog
Twitter

Please give me your LTO-4 or better tape library and I'll put it to good use.
found something from the cache
non port: head/net-mgmt/zabbix/files/patch-USH-162.1
SVNWeb

Number of commits found: 2

Thu, 23 Apr 2009
[ 18:42 wxs ] Original commit 
1.62 net-mgmt/zabbix/Makefile
1.23 net-mgmt/zabbix/distinfo
1.2 net-mgmt/zabbix/files/patch-USH-162.1
1.2 net-mgmt/zabbix/files/patch-USH-162.2
1.4 net-mgmt/zabbix/files/patch-configure
1.21 net-mgmt/zabbix/pkg-plist
- Update to 1.6.4.
- Pass maintainer to submitter (last 3 updates were timeouts).

PR:             ports/133449
Submitted by:   Jim Riggs <ports@christianserving.org>
Approved by:    maintainer timeout
Mon, 23 Mar 2009
[ 15:06 miwi ] Original commit 
1.25 net-mgmt/zabbix-agent/Makefile
1.61 net-mgmt/zabbix/Makefile
1.1 net-mgmt/zabbix/files/patch-USH-162.1
1.1 net-mgmt/zabbix/files/patch-USH-162.2
1.20 net-mgmt/zabbix/pkg-plist
- Fix zabbix -- php frontend multiple vulnerabilities

Note:

        Input appended to and passed via the "extlang" parameter to the
"calc_exp2()"
        function in include/validate.inc.php is not properly sanitised before
being
        used. This can be exploited to inject and execute arbitrary PHP code.

        The application allows users to perform certain actions via HTTP
requests
        without performing any validity checks to verify the requests. This can
be
        exploited to e.g. create users by enticing a logged in administrator to
        visit a malicious web page.

        Input passed to the "srclang" parameter in locales.php (when "next" is
set
        to a non-NULL value) is not properly verified before being used to
include
        files. This can be exploited to include arbitrary files from local
resources
        via directory traversal attacks and URL-encoded NULL bytes.

- Bump PORTREVISION

PR:             132944
Submitted by:   Eygene Ryabinkin <rea-fbsd@codelabs.ru> (many thanks!)
Approved by:    maintainer timeout (security 1 day)
Security:      
http://www.vuxml.org/freebsd/03140526-1250-11de-a964-0030843d3802.html

Number of commits found: 2

Login
User Login
Create account

Servers and bandwidth provided by
New York Internet, SuperNews, and RootBSD

This site
What is FreshPorts?
About the authors
FAQ
How big is it?
The latest upgrade!
Privacy
Forums
Blog
Contact

Search
Enter Keywords:
 
more...

Latest Vulnerabilities
cinepaint*Jul 01
darktable*Jul 01
dcraw*Jul 01
dcraw-m*Jul 01
exact-image*Jul 01
flphoto*Jul 01
freeimage*Jul 01
kodi*Jul 01
libraw*Jul 01
libxml2Jul 01
lightzone*Jul 01
netpbm*Jul 01
opengtl*Jul 01
rawstudio*Jul 01
ufraw*Jul 01

27 vulnerabilities affecting 60 ports have been reported in the past 14 days

* - modified, not new

All vulnerabilities


Ports
Home
Categories
Deleted ports
Sanity Test Failures
Newsfeeds

Statistics
Graphs
NEW Graphs (Javascript)
Traffic

Calculated hourly:
Port count 24948
Broken 208
Deprecated 44
Ignore 505
Forbidden 1
Restricted 204
No CDROM 94
Vulnerable 32
Expired 1
Set to expire 32
Interactive 0
new 24 hours 10
new 48 hours20
new 7 days66
new fortnight92
new month180

Servers and bandwidth provided by
New York Internet, SuperNews, and RootBSD
Valid HTML, CSS, and RSS.
Copyright © 2000-2014 Dan Langille. All rights reserved.