FreshPorts -- The Place For Ports If you buy from Amazon USA, please support us by using this link.
Follow us
Blog
Twitter

Please give me your LTO-4 or better tape library and I'll put it to good use.
found something from the cache
non port: head/net-mgmt/zabbix/files/patch-USH-162.1
SVNWeb

Number of commits found: 2

Thu, 23 Apr 2009
[ 18:42 wxs ] Original commit 
1.62 net-mgmt/zabbix/Makefile
1.23 net-mgmt/zabbix/distinfo
1.2 net-mgmt/zabbix/files/patch-USH-162.1
1.2 net-mgmt/zabbix/files/patch-USH-162.2
1.4 net-mgmt/zabbix/files/patch-configure
1.21 net-mgmt/zabbix/pkg-plist
- Update to 1.6.4.
- Pass maintainer to submitter (last 3 updates were timeouts).

PR:             ports/133449
Submitted by:   Jim Riggs <ports@christianserving.org>
Approved by:    maintainer timeout
Mon, 23 Mar 2009
[ 15:06 miwi ] Original commit 
1.25 net-mgmt/zabbix-agent/Makefile
1.61 net-mgmt/zabbix/Makefile
1.1 net-mgmt/zabbix/files/patch-USH-162.1
1.1 net-mgmt/zabbix/files/patch-USH-162.2
1.20 net-mgmt/zabbix/pkg-plist
- Fix zabbix -- php frontend multiple vulnerabilities

Note:

        Input appended to and passed via the "extlang" parameter to the
"calc_exp2()"
        function in include/validate.inc.php is not properly sanitised before
being
        used. This can be exploited to inject and execute arbitrary PHP code.

        The application allows users to perform certain actions via HTTP
requests
        without performing any validity checks to verify the requests. This can
be
        exploited to e.g. create users by enticing a logged in administrator to
        visit a malicious web page.

        Input passed to the "srclang" parameter in locales.php (when "next" is
set
        to a non-NULL value) is not properly verified before being used to
include
        files. This can be exploited to include arbitrary files from local
resources
        via directory traversal attacks and URL-encoded NULL bytes.

- Bump PORTREVISION

PR:             132944
Submitted by:   Eygene Ryabinkin <rea-fbsd@codelabs.ru> (many thanks!)
Approved by:    maintainer timeout (security 1 day)
Security:      
http://www.vuxml.org/freebsd/03140526-1250-11de-a964-0030843d3802.html

Number of commits found: 2

Login
User Login
Create account

Servers and bandwidth provided by
New York Internet, SuperNews, and RootBSD

This site
What is FreshPorts?
About the authors
FAQ
How big is it?
The latest upgrade!
Privacy
Forums
Blog
Contact

Search
Enter Keywords:
 
more...

Latest Vulnerabilities
proftpdMay 20
chromiumMay 19
clamavMay 19
ipsec-toolsMay 19
qemuMay 17
qemu-develMay 17
qemu-sbrunoMay 17
ruby-gemsMay 17
quasselMay 16
ufrawMay 15
rubygem-redcarpetMay 14
phpmyadminMay 13
firefoxMay 12
firefox-esrMay 12
libxulMay 12

17 vulnerabilities affecting 46 ports have been reported in the past 14 days

* - modified, not new

All vulnerabilities


Ports
Home
Categories
Deleted ports
Sanity Test Failures
Newsfeeds

Statistics
Graphs
NEW Graphs (Javascript)
Traffic

Calculated hourly:
Port count 24803
Broken 223
Deprecated 63
Ignore 492
Forbidden 1
Restricted 204
No CDROM 95
Vulnerable 21
Expired 9
Set to expire 54
Interactive 0
new 24 hours 4
new 48 hours7
new 7 days39
new fortnight82
new month133

Servers and bandwidth provided by
New York Internet, SuperNews, and RootBSD
Valid HTML, CSS, and RSS.
Copyright © 2000-2014 Dan Langille. All rights reserved.