| Commit History - (may be incomplete: for full details, see links to repositories near top of page) |
| Commit | Credits | Log message |
1.1_1 16 Jun 2009 20:45:46
 |
miwi  |
- Fix a typo from previous commit |
1.1_1 16 Jun 2009 20:10:47
 |
skreuzer  |
Document joomla -- multiple vulnerabilities
Approved by: wxs (mentor) |
1.1_1 16 Jun 2009 20:04:13
 |
miwi  |
- Document pidgin -- multiple vulnerabilities
PR: 135239 (based on)
Submitted by: Eygene Ryabinkin <rea-fbsd@codelabs.ru> |
1.1_1 15 Jun 2009 13:57:19
 |
wxs  |
- Document git-daemon DoS. |
1.1_1 12 Jun 2009 22:46:49
 |
stas  |
- Fix the latest ruby entry: 1.9 branch is not vulnerable. |
1.1_1 12 Jun 2009 22:07:41
 |
stas  |
- Document ruby denial of sevice vulnerability in BigDecimal. |
1.1_1 12 Jun 2009 15:40:58
 |
beat  |
- Fix firefox3 version in da185955-5738-11de-b857-000f20797ede
Approved by: miwi (secteam) |
1.1_1 12 Jun 2009 14:55:51
 |
beat  |
- Document mozilla -- multiple vulnerabilities
Approved by: miwi (secteam) |
1.1_1 08 Jun 2009 06:19:48
 |
miwi  |
- Add some more cve to the previous entry |
1.1_1 08 Jun 2009 06:17:53
 |
miwi  |
- Fix previous entry |
1.1_1 08 Jun 2009 02:21:53
 |
pgollucci  |
Document DOS in apr-util xml(expat) processing
Submitted by: Eygene Ryabinkin <rea-fbsd@codelabs.ru> |
1.1_1 04 Jun 2009 21:52:26
 |
delphij  |
Document dokuwiki local File Inclusion with register_globals on vulnerability. |
1.1_1 30 May 2009 20:53:22
 |
miwi  |
- Document openssl -- denial of service in DTLS implementation
PR: based on 134653
Submitted by: Eygene Ryabinkin <rea-fbsd@codelabs.ru> |
1.1_1 30 May 2009 20:39:39
 |
miwi  |
- Document eggdrop -- denial of service vulnerability |
1.1_1 30 May 2009 20:07:42
 |
miwi  |
- Document wireshark -- Denial of Service in the PCNFSD dissector
PR: 135061 (based on)
Submitted by: Eygene Ryabinkin <rea-fbsd@codelabs.ru> |
1.1_1 30 May 2009 19:23:41
 |
miwi  |
- Add more infos for libsndfile entry |
1.1_1 30 May 2009 19:16:35
 |
miwi  |
- Document libsndfile -- multiple vulnerabilities |
1.1_1 30 May 2009 19:07:01
 |
miwi  |
- Document slim -- local disclosure of X authority magic cookie |
1.1_1 23 May 2009 10:50:54
 |
miwi  |
- Cleanup previous entry |
1.1_1 23 May 2009 09:15:36
 |
simon  |
Unbreak file by removing double <vuxml> tag. |
1.1_1 23 May 2009 04:37:11
 |
cy  |
Add CVE information for NTP stack overflow.
PR: 134755
Submitted by: Mark Foster <mark@foster.cc>
Security: CVE-2009-0159 and CVE-2009-1252 |
1.1_1 22 May 2009 16:34:03
 |
miwi  |
- Fix 5ed2f96b-33b7-4863-8c6b-540d22344424
* Remove duplicte url
* Fix safe version
* Bump modified date |
1.1_1 22 May 2009 16:08:21
 |
miwi  |
- Bump modified date for previous commit. |
1.1_1 22 May 2009 13:15:34
 |
wxs  |
- Add CVE information for nsd overflow.
- s/over flow/overflow/ for the same entry.
Submitted by: Eygene Ryabinkin <rea-fbsd@codelabs.ru> (private mail) |
1.1_1 21 May 2009 15:30:42
 |
pav  |
- Document imap-uw -- University of Washington IMAP c-client Remote Format
String Vulnerability (submitted back in Feb 2009)
PR: ports/131939
Submitted by: Mark Foster <mark@foster.cc> |
1.1_1 19 May 2009 17:20:27
 |
wxs  |
- Document dns/nsd and dns/nsd2 one-byte overflow (both are already fixed
in ports). Still need a CVE entry but there is not one assigned yet. |
1.1_1 17 May 2009 15:05:20
 |
nobutaka  |
Add entries of libxine vulnerabilities fixed in version 1.1.16.2 and 1.1.16.3.
PR: ports/132593
Submitted by: Eygene Ryabinkin <rea-fbsd@codelabs.ru> |
1.1_1 16 May 2009 20:36:19
 |
miwi  |
- Document php -- ini database truncation inside dba_replace() function
PR: 129459 (based on)
Submitted by: Eygene Ryabinkin <rea-fbsd@codelabs.ru> |
1.1_1 16 May 2009 20:09:00
 |
miwi  |
- Document libwmf -- embedded GD library Use-After-Free vulnerability
PR: based on 134246 |
1.1_1 16 May 2009 19:59:44
 |
miwi  |
- Document libwmf -- Integer Overflow Vulnerability
PR: based on 134246 |
1.1_1 16 May 2009 13:01:26
 |
miwi  |
- Document moinmoin -- cross-site scripting vulnerabilities |
1.1_1 16 May 2009 12:51:24
 |
miwi  |
- Rework previus entry |
1.1_1 16 May 2009 01:32:37
 |
pgollucci  |
- Document mod_perl -- cross site scripting in Apache::Status |
1.1_1 16 May 2009 00:44:25
 |
miwi  |
- Small cleanup
* fix spelling
* fix tabs/whitespaces
* add more references to the latest drual entry |
1.1_1 16 May 2009 00:36:02
 |
miwi  |
- Fix formating |
1.1_1 15 May 2009 22:26:01
 |
delphij  |
Document drupal -- cross-site scripting vulnerability.
Submitted by: Nick Hilliard <nick foobar org> |
1.1_1 15 May 2009 01:49:18
 |
ume  |
- Document cyrus-sasl -- buffer overflow vulnerability |
1.1_1 13 May 2009 10:07:30
 |
miwi  |
- Document moinmoin -- multiple cross site scripting vulnerabilities
PR: based on 134467 |
1.1_1 13 May 2009 08:23:57
 |
miwi  |
- Document ghostscript8 -- Buffer Overflow Vulnerability
PR: 133331 (baesed on) |
1.1_1 13 May 2009 08:10:48
 |
miwi  |
- Cleanup |
1.1_1 13 May 2009 07:55:07
 |
miwi  |
- Added a referece to the latest pango entry
(4b172278-3f46-11de-becb-001cc0377035) |
1.1_1 12 May 2009 23:03:02
 |
stas  |
- Document pango buffer overflow vulnerability. |
1.1_1 09 May 2009 20:13:24
 |
marcus  |
Document the recent Wireshark vulnerabilities.
PR: 134245
Submitted by: Eygene Ryabinkin <rea-fbsd@codelabs.ru> |
1.1_1 07 May 2009 14:46:03
 |
wxs  |
- Add CVE entry for quagga vulnerability.
Submitted by: Eygene Ryabinkin <rea-fbsd@codelabs.ru> (private mail) |
1.1_1 07 May 2009 07:57:05
 |
dinoex  |
- add CUPS 1.3.10
PR: 134247 |
1.1_1 07 May 2009 07:40:39
 |
dinoex  |
- add SA-09:08.openssl
PR: 133156 |
1.1_1 06 May 2009 13:14:21
 |
wxs  |
- Document quagga DoS.
PR: ports/134248
Submitted by: Eygene Ryabinkin <rea-fbsd@codelabs.ru>
Reviewed by: miwi |
1.1_1 05 May 2009 08:04:59
 |
beat  |
- Mark flock 2.0 as safe
Approved by: miwi (mentor) |
1.1_1 04 May 2009 20:10:04
 |
miwi  |
- Cleanup previous entry |
1.1_1 04 May 2009 14:35:16
 |
gahr  |
- Document openfire -- Password Changes Security Bypass
PR: 134207
Submitted by: Mark Foster <mark@foster.cc> |
1.1_1 30 Apr 2009 20:09:42
 |
miwi  |
- Document drupal -- cross site scripting |
1.1_1 28 Apr 2009 21:32:24
 |
stas  |
- CVE-2007-3387 has been fixed in pdftohtml 0.39_3. |
1.1_1 22 Apr 2009 08:38:33
 |
miwi  |
- Document mozilla -- multiple vulnerabilities |
1.1_1 18 Apr 2009 18:26:26
 |
marcus  |
Document the recent poppler vulnerabilities fixed in 0.10.6.
PR: 133838
Submitted by: Mark Foster <mark@foster.cc>
Approved by: portmgr (implicit) |
1.1_1 18 Apr 2009 17:55:20
 |
miwi  |
- Rework previus entry (xpdf -- multiple vulnerabilities)
* fix typos
* added more information about security issues
* added more reference sites
Approved by: portmgr (secteam blanked) |
1.1_1 18 Apr 2009 17:20:19
 |
araujo  |
- Document xpdf -- multiple vulnerabilities
Approved by: portmgr (erwin) |
1.1_1 18 Apr 2009 09:41:32
 |
miwi  |
- Document freetype2 -- multiple vulnerabilities
Approved by: portmgr (secteam blanked) |
1.1_1 17 Apr 2009 16:51:06
 |
wxs  |
- Document ejabberd cross-site scripting vulnerability.
PR: ports/132800
Submitted by: Mark Foster <mark@foster.cc>
Reviewed by: miwi
Approved by: portmgr (secteam blanket, explicitly miwi) |
1.1_1 15 Apr 2009 13:34:52
 |
miwi  |
- Document ziproxy -- Multiple HTTP Proxy HTTP Host Header Incorrect Relay
Behavior Vulnerability
Approved by: portmgr (secteam blanked) |
1.1_1 15 Apr 2009 13:17:13
 |
miwi  |
- Document phpmyadmin -- insufficient output sanitizing when generating
configuration file
Approved by: portmgr (secteam blanked) |
1.1_1 11 Apr 2009 12:01:18
 |
miwi  |
- Document drupal6-cck -- cross-site scripting
PR: 133550
Submitted by: Eygene Ryabinkin <rea-fbsd@codelabs.ru> |
1.1_1 27 Mar 2009 21:49:39
 |
miwi  |
- Document pivot-weblog -- file deletion vulnerability |
1.1_1 26 Mar 2009 14:13:03
 |
mat  |
Fix the roundcube version of CVE-2009-0413, should be 0.2.1,1 and not 0.2.1.
Pointy Hat To: miwi |
1.1_1 25 Mar 2009 07:41:42
 |
delphij  |
Document phpmyadmin: insufficient output sanitizing when generating
configuration file. |
1.1_1 23 Mar 2009 15:43:25
 |
miwi  |
- Update 8e8b8b94-7f1d-11dd-a66a-0019666436c2 (www/rubygem-rails) now secure
- Bump modified day
Reported by: Mike Duchene |
1.1_1 23 Mar 2009 15:28:09
 |
miwi  |
- Fix daf045d7-b211-11dd-a987-000c29ca8953
- Fix discovery date
- Tell portaudit net-snmp is secure
Reported by: Oliver Brandmueller <ob@e-Gitt.NET> (via private mail)
Reviewed by: tabthorpe |
1.1_1 23 Mar 2009 15:08:29
 |
miwi  |
- Update zabbix entry is now secure |
1.1_1 23 Mar 2009 14:22:46
 |
miwi  |
- Fix spelling |
1.1_1 23 Mar 2009 14:17:47
 |
miwi  |
- Document amarok -- multiple vulnerabilitie
PR: based on 132938 |
1.1_1 23 Mar 2009 14:09:31
 |
miwi  |
- Fix portaudit build
- Rework latest wireshark entry
- Bump modified |
1.1_1 22 Mar 2009 19:26:13
 |
miwi  |
- Cleanup latest Wireshark entry |
1.1_1 22 Mar 2009 19:24:02
 |
miwi  |
- Bump modified date for zope entry |
1.1_1 22 Mar 2009 18:24:25
 |
pav  |
- zope-2.7.9_2 secure |
1.1_1 22 Mar 2009 17:11:18
 |
marcus  |
Add an entry for Wireshark less than or equal to 1.0.5 pertaining to
multiple DoS situations as described at
http://www.wireshark.org/security/wnpa-sec-2009-01.html.
PR: 131688
Submitted by: Mark Foster <mark@foster.cc> |
1.1_1 20 Mar 2009 22:01:24
 |
miwi  |
- Mark *seamonkey as safe |
1.1_1 20 Mar 2009 21:59:37
 |
miwi  |
- Add CVE's referenc to 78f5606b-f9d1-11dd-b79c-0030843d3802
PR: 132797
Submitted by: Mark Foster <mark@foster.cc> |
1.1_1 20 Mar 2009 21:13:46
 |
miwi  |
- Mark mail/*thunderbird as safe |
1.1_1 18 Mar 2009 16:18:57
 |
miwi  |
- Added more references to the netatalk |
1.1_1 18 Mar 2009 15:34:56
 |
miwi  |
- Small cleanup |
1.1_1 18 Mar 2009 15:05:04
 |
miwi  |
- Document netatalk -- arbitrary command execution in papd daemon
PR: based on 132427
Submitted by: Eygene Ryabinkin <rea-fbsd@codelabs.ru> |
1.1_1 16 Mar 2009 21:01:10
 |
miwi  |
- Fix discovery date from previous entry |
1.1_1 16 Mar 2009 20:37:17
 |
miwi  |
- Document gstreamer-plugins-good -- multiple memory overflows
PR: based on 132428 |
1.1_1 16 Mar 2009 19:50:10
 |
miwi  |
- Document libsndfile -- CAF processing integer overflow vulnerability
PR: based on 132371 |
1.1_1 16 Mar 2009 19:33:23
 |
miwi  |
- Fix roundcube entry
Pointy hat to: me |
1.1_1 16 Mar 2009 19:25:07
 |
miwi  |
- Document ffmpeg -- 4xm processing memory corruption vulnerability
PR: based on 132434
Submitted by: Eygene Ryabinkin <rea-fbsd@codelabs.ru> |
1.1_1 16 Mar 2009 18:49:33
 |
miwi  |
- Document roundcube -- webmail script insertion and php code injection
PR: based on 130968 |
1.1_1 16 Mar 2009 18:11:52
 |
miwi  |
- Document proftpd -- multiple sql injection vulnerabilities
PR: based on 132369 |
1.1_1 16 Mar 2009 17:51:11
 |
miwi  |
- Fix a typo |
1.1_1 16 Mar 2009 17:38:25
 |
miwi  |
- Document zappix -- php frontend multiple vulnerabilities
PR: based on 132315 |
1.1_1 16 Mar 2009 17:13:49
 |
miwi  |
- Document php-mbstring -- php mbstring buffer overflow vulnerability
PR: based on 130603 |
1.1_1 16 Mar 2009 17:01:05
 |
miwi  |
- Document phppgadmin -- directory traversal with register_globals enabled
PR: based on 132346 |
1.1_1 15 Mar 2009 20:42:26
 |
miwi  |
- Document opera -- multiple vulnerabilities
PR: based on 132437 |
1.1_1 14 Mar 2009 08:35:45
 |
miwi  |
- Clean up latest curl entry |
1.1_1 12 Mar 2009 02:30:02
 |
tabthorpe  |
- Document epiphany -- untrusted search path vulnerability |
1.1_1 11 Mar 2009 20:17:11
 |
tabthorpe  |
- Document apache -- Cross-site scripting vulnerability |
1.1_1 05 Mar 2009 00:35:08
 |
amdmi3  |
- Document pngcrush -- libpng Uninitialised Pointer Arrays Vulnerability
Reviewed by: tabthorpe |
1.1_1 04 Mar 2009 15:30:27
 |
roam  |
Document the cURL redirection security bypass - CVE-2009-0037.
I'll update the ftp/curl port itself ASAP.
PR: 132299
Reported by: Mark Foster <mark@foster.cc> (the PR),
Daniel Bond <db@danielbond.org> (e-mail) |
1.1_1 23 Feb 2009 20:48:17
 |
marcus  |
Bump the modified date for the previous Firefox change.
Requested by: miwi |
1.1_1 23 Feb 2009 20:41:48
 |
marcus  |
Correct the Firefox 2.0 version for the recent Firefox vulnerabilities. |
1.1_1 23 Feb 2009 00:53:23
 |
mnag  |
- Add CVE entries for last lighttpd security issue.
Reported by: Eygene Ryabinkin <rea-fbsd___codelabs.ru> |