FreshPorts -- The Place For Ports If you buy from Amazon USA, please support us by using this link.
Follow us
Blog
Twitter

Sanity Test Failure
Wed, 4 Jun 2008
[ 13:12 edwin ] Original commit   Sanity Test Failure
openvas-client 1.0.3 security  Deleted files touched by this commit GUI client for OpenVAS
[NEW PORT] security/openvas-client: A GUI client for OpenVAS

        OpenVAS stands for Open Vulnerability Assessment System and
        is a network security scanner with associated tools like a
        graphical user fontend. The core is a server component with
        a set of network vulnerability tests (NVTs) to detect
        security problems in remote systems and applications.

        WWW: http://www.openvas.org/

PR:             ports/123131
Submitted by:   Tomoyuki Sakurai <cherry@trombik.org>

Sanity Test Results

security/openvas-client:

This command (FreshPorts code 1):

make -V PORTNAME -V PKGNAME -V DESCR -V CATEGORIES -V PORTVERSION -V
PORTREVISION  -V COMMENT -V COMMENTFILE -V MAINTAINER -V EXTRACT_SUFX  -V
BUILD_DEPENDS -V RUN_DEPENDS -V LIB_DEPENDS -V FORBIDDEN -V BROKEN -V
DEPRECATED -V IGNORE  -V MASTER_PORT -V LATEST_LINK -V NO_LATEST_LINK -V
NO_PACKAGE -V PKGNAMEPREFIX -V PKGNAMESUFFIX -V PORTEPOCH  -V RESTRICTED -V
NO_CDROM -V EXPIRATION_DATE -V IS_INTERACTIVE  -V ONLY_FOR_ARCHS -V
NOT_FOR_ARCHS -f /usr/home/dan/ports/security/openvas-client/Makefile 
DISTDIR=/usr/ports/distfiles  PORTSDIR=/usr/home/dan/ports
LOCALBASE=/nonexistentlocal X11BASE=/nonexistentx
2>/tmp/FreshPorts.security.openvas-client.make-error.2008.6.4.14.12.38.5670
4

produced this error:

Error message is: "/usr/home/dan/ports/security/openvas-client/Makefile",
line 22: Could not find
/usr/home/dan/ports/security/openvas-client/../../security/openvas-server/M
akefile.common
make: fatal errors encountered -- cannot continue

Login
User Login
Create account

Servers and bandwidth provided by
New York Internet, SuperNews, and RootBSD

This site
What is FreshPorts?
About the authors
Issues
FAQ
How big is it?
The latest upgrade!
Privacy
Forums
Blog
Contact

Search
Enter Keywords:
 
more...

Latest Vulnerabilities
asterisk11Dec 09
asterisk13Dec 09
asterisk13Dec 09
apache24Dec 06
cryptoppDec 06
mod_http2-develDec 06
py-cryptography*Dec 06
qemu*Dec 06
qemu-devel*Dec 06
qemu-sbruno*Dec 06
chromiumDec 05
ImageMagickDec 04
ImageMagick-nox11Dec 04
ImageMagick7Dec 04
ImageMagick7Dec 04

35 vulnerabilities affecting 66 ports have been reported in the past 14 days

* - modified, not new

All vulnerabilities


Ports
Home
Categories
Deleted ports
Sanity Test Failures
Newsfeeds

Statistics
Graphs
NEW Graphs (Javascript)
Traffic

Calculated hourly:
Port count 26974
Broken 309
Deprecated 169
Ignore 573
Forbidden 1
Restricted 214
No CDROM 82
Vulnerable 59
Expired 7
Set to expire 148
Interactive 0
new 24 hours 5
new 48 hours12
new 7 days66
new fortnight123
new month295



Servers and bandwidth provided by
New York Internet, SuperNews, and RootBSD
Valid HTML, CSS, and RSS.
Copyright © 2000-2014 Dan Langille. All rights reserved.