FreshPorts -- The Place For Ports If you buy from Amazon USA, please support us by using this link.
Follow us
Blog
Twitter

We also have a status page: https://freshports.wordpress.com/

non port: devel/bugzilla44/pkg-plist
SVNWeb

Number of commits found: 8

Sun, 31 May 2015
[ 16:07 ohauer ] Original commit   Revision:388117
388117 devel/bugzilla44/Makefile
388117 devel/bugzilla44/Makefile.common
388117 devel/bugzilla44/Makefile.options
388117 devel/bugzilla44/distinfo
388117 devel/bugzilla44/pkg-plist
- update to 4.4.9
Mon, 1 Dec 2014
[ 23:19 ohauer ] Original commit   Revision:373727
373727 devel/bugzilla44/Makefile
373727 devel/bugzilla44/pkg-plist
- list empty dirs (make qa-script happy)
- if PERL_LEVEL >= 501800, then also depend on devel/p5-Module-Pluggable
   Module::Pluggable from perl5.18 complains about deprection and this way
   cron job notice is no longer readable
- bump PORTREVISION
Mon, 27 Oct 2014
[ 10:10 bapt ] Original commit   Revision:371544
371544 devel/bcpp/pkg-plist
371544 devel/bennugd-modules/pkg-plist
371544 devel/bglibs/pkg-plist
371544 devel/bicyclerepair/pkg-plist
371544 devel/bison/pkg-plist
371544 devel/bisoncpp/pkg-plist
371544 devel/bncsutil-ghost++/pkg-plist
371544 devel/boaconstructor/pkg-plist
371544 devel/boehm-gc/pkg-plist
371544 devel/bouml-doc/pkg-plist

(Only the first 10 of 286 ports in this commit are shown above. View all ports for this commit)
Cleanup plist
Mon, 6 Oct 2014
[ 19:16 ohauer ] Original commit   Revision:370211
370211 devel/bugzilla44/Makefile
370211 devel/bugzilla44/distinfo
370211 devel/bugzilla44/pkg-plist
- update to bugzilla 4.4.6

Summary
=======
The following security issues have been discovered in Bugzilla:

* The 'realname' parameter is not correctly filtered on user account
  creation, which could lead to user data override.
* Several places were found in the Bugzilla code where cross-site
  scripting attacks could be used to access sensitive information.
* Private comments can be shown to flagmail recipients who aren't in
  the insider group
* Specially formatted values in a CSV search results export could be
  used in spreadsheet software to attack a user's computer.

Security:	CVE-2014-1572
		CVE-2014-1571
		CVE-2014-1571
Fri, 25 Jul 2014
[ 14:15 ohauer ] Original commit   Revision:362911
362911 devel/bugzilla44/Makefile
362911 devel/bugzilla44/distinfo
362911 devel/bugzilla44/pkg-plist
- update to bugzilla44-4.4.5

Vulnerability Details
=====================

Class:       Cross Site Request Forgery
Versions:    3.7.1 to 4.0.13, 4.1.1 to 4.2.9, 4.3.1 to 4.4.4, 4.5.1 to 4.5.4
Fixed In:    4.0.14, 4.2.10, 4.4.5, 4.5.5
Description: Adobe does not properly restrict the SWF file format,
             which allows remote attackers to conduct cross-site
             request forgery (CSRF) attacks against Bugzilla's JSONP
             endpoint, possibly obtaining sensitive bug information,
             via a crafted OBJECT element with SWF content satisfying
             the character-set requirements of a callback API.

http://www.bugzilla.org/security/4.0.13/

MFH:		2014Q3
Security:	9defb2d6-1404-11e4-8cae-20cf30e32f6d
		CVE-2014-1546
Fri, 18 Apr 2014
[ 15:03 ohauer ] Original commit   Revision:351542
351542 devel/bugzilla40/Makefile
351542 devel/bugzilla40/Makefile.common
351542 devel/bugzilla40/distinfo
351542 devel/bugzilla42/Makefile
351542 devel/bugzilla42/Makefile.common
351542 devel/bugzilla42/distinfo
351542 devel/bugzilla44/Makefile
351542 devel/bugzilla44/Makefile.common
351542 devel/bugzilla44/distinfo
351542 devel/bugzilla44/pkg-plist
- update to 4.0.12, 4.2.8, 4.4.3
- move BINMODE to Makefile.common so it is also used in the language packs

Security:	CVE-2014-1517
Security:	608ed765-c700-11e3-848c-20cf30e32f6d
Security:	60bfa396-c702-11e3-848c-20cf30e32f6d
Thu, 17 Oct 2013
[ 19:35 ohauer ] Original commit   Revision:330666
330666 MOVED
330666 devel/Makefile
330666 devel/bugzilla
330666 devel/bugzilla40
330666 devel/bugzilla40/Makefile
330666 devel/bugzilla40/Makefile.common
330666 devel/bugzilla40/Makefile.options
330666 devel/bugzilla40/distinfo
330666 devel/bugzilla40/pkg-plist
330666 devel/bugzilla42/Makefile

(Only the first 10 of 36 ports in this commit are shown above. View all ports for this commit)
- update to latest release [1]
- use PKGNAMESUFFIX instead LATEST_LINK
- whitespace cleanup
- svn mv */bugzilla to */bugzilla40
- add vuxml entry

4.4.1, 4.2.7, and 4.0.11 Security Advisory
Wednesday Oct 16th, 2013

Summary
=======

Bugzilla is a Web-based bug-tracking system used by a large number of
software projects. The following security issues have been discovered
in Bugzilla:
(Only the first 15 lines of the commit message are shown above View all of this commit message)
Thu, 20 Jun 2013
[ 22:21 ohauer ] Original commit   Revision:321429
321429 devel/Makefile
321429 devel/bugzilla44
321429 devel/bugzilla44/Makefile
321429 devel/bugzilla44/Makefile.common
321429 devel/bugzilla44/Makefile.options
321429 devel/bugzilla44/distinfo
321429 devel/bugzilla44/pkg-plist
321429 german/Makefile
321429 german/bugzilla44
321429 german/bugzilla44/Makefile

(Only the first 10 of 16 ports in this commit are shown above. View all ports for this commit)
New ports for bugzilla44
- devel/bugzilla44
- japanese/bugzilla44
- german/bugzilla44

Release Notes:
http://www.bugzilla.org/releases/4.4/release-notes.html

Number of commits found: 8

Login
User Login
Create account

Servers and bandwidth provided by
New York Internet, SuperNews, and RootBSD

This site
What is FreshPorts?
About the authors
Issues
FAQ
How big is it?
The latest upgrade!
Privacy
Forums
Blog
Contact

Search
Enter Keywords:
 
more...

Latest Vulnerabilities
opensslNov 02
openssl-develNov 02
wordpressNov 01
php56Oct 30
php70Oct 30
php71Oct 30
wiresharkOct 30
chromiumOct 28
wgetOct 27
wgetOct 27
openoffice-4*Oct 26
openoffice-devel*Oct 26
gitlabOct 25
nodeOct 25
node4Oct 25

No vulnerabilities have been reported in the past 14 days

* - modified, not new

All vulnerabilities


Ports
Home
Categories
Deleted ports
Sanity Test Failures
Newsfeeds

Statistics
Graphs
NEW Graphs (Javascript)
Traffic

Calculated hourly:
Port count 31876
Broken 126
Deprecated 55
Ignore 364
Forbidden 0
Restricted 175
No CDROM 78
Vulnerable 50
Expired 11
Set to expire 47
Interactive 0
new 24 hours 7
new 48 hours12
new 7 days3213
new fortnight3398
new month3453

Servers and bandwidth provided by
New York Internet, SuperNews, and RootBSD
Valid HTML, CSS, and RSS.
Copyright © 2000-2017 Dan Langille. All rights reserved.