FreshPorts -- The Place For Ports If you buy from Amazon USA, please support us by using this link.
Follow us
Blog
Twitter

Please give me your LTO-4 or better tape library and I'll put it to good use.
found something from the cache
non port: head/net-mgmt/zabbix/files/patch-USH-162.1
SVNWeb

Number of commits found: 2

Thu, 23 Apr 2009
[ 18:42 wxs ] Original commit 
1.62 net-mgmt/zabbix/Makefile
1.23 net-mgmt/zabbix/distinfo
1.2 net-mgmt/zabbix/files/patch-USH-162.1
1.2 net-mgmt/zabbix/files/patch-USH-162.2
1.4 net-mgmt/zabbix/files/patch-configure
1.21 net-mgmt/zabbix/pkg-plist
- Update to 1.6.4.
- Pass maintainer to submitter (last 3 updates were timeouts).

PR:             ports/133449
Submitted by:   Jim Riggs <ports@christianserving.org>
Approved by:    maintainer timeout
Mon, 23 Mar 2009
[ 15:06 miwi ] Original commit 
1.25 net-mgmt/zabbix-agent/Makefile
1.61 net-mgmt/zabbix/Makefile
1.1 net-mgmt/zabbix/files/patch-USH-162.1
1.1 net-mgmt/zabbix/files/patch-USH-162.2
1.20 net-mgmt/zabbix/pkg-plist
- Fix zabbix -- php frontend multiple vulnerabilities

Note:

        Input appended to and passed via the "extlang" parameter to the
"calc_exp2()"
        function in include/validate.inc.php is not properly sanitised before
being
        used. This can be exploited to inject and execute arbitrary PHP code.

        The application allows users to perform certain actions via HTTP
requests
        without performing any validity checks to verify the requests. This can
be
        exploited to e.g. create users by enticing a logged in administrator to
        visit a malicious web page.

        Input passed to the "srclang" parameter in locales.php (when "next" is
set
        to a non-NULL value) is not properly verified before being used to
include
        files. This can be exploited to include arbitrary files from local
resources
        via directory traversal attacks and URL-encoded NULL bytes.

- Bump PORTREVISION

PR:             132944
Submitted by:   Eygene Ryabinkin <rea-fbsd@codelabs.ru> (many thanks!)
Approved by:    maintainer timeout (security 1 day)
Security:      
http://www.vuxml.org/freebsd/03140526-1250-11de-a964-0030843d3802.html

Number of commits found: 2

Login
User Login
Create account

Servers and bandwidth provided by
New York Internet, SuperNews, and RootBSD

This site
What is FreshPorts?
About the authors
FAQ
How big is it?
The latest upgrade!
Privacy
Forums
Blog
Contact

Search
Enter Keywords:
 
more...

Latest Vulnerabilities
cross-binutilsMar 24
jenkinsMar 24
jenkins-ltsMar 24
libressl*Mar 24
linux-c6-openssl*Mar 24
mingw32-openssl*Mar 24
mingw64-binutilsMar 24
openssl*Mar 24
firefoxMar 22
firefox-esrMar 22
libxulMar 22
linux-firefoxMar 22
linux-seamonkeyMar 22
seamonkeyMar 22
sympaMar 13

5 vulnerabilities affecting 24 ports have been reported in the past 14 days

* - modified, not new

All vulnerabilities


Ports
Home
Categories
Deleted ports
Sanity Test Failures
Newsfeeds

Statistics
Graphs
NEW Graphs (Javascript)
Traffic

Calculated hourly:
Port count 24726
Broken 132
Deprecated 142
Ignore 418
Forbidden 3
Restricted 203
No CDROM 95
Vulnerable 20
Expired 5
Set to expire 134
Interactive 0
new 24 hours 5
new 48 hours8
new 7 days33
new fortnight44
new month132

Servers and bandwidth provided by
New York Internet, SuperNews, and RootBSD
Valid HTML, CSS, and RSS.
Copyright © 2000-2014 Dan Langille. All rights reserved.