1
0
mirror of https://git.FreeBSD.org/ports.git synced 2024-12-13 03:03:15 +00:00
Commit Graph

12 Commits

Author SHA1 Message Date
Gabor Kovesdan
fc31150f7a - Update to 1.0.12
- Update MASTER_SITES

Release info for 1.0.12: http://www.joomla.org/content/view/2446/1/

PR:		ports/107889
Submitted by:	Francisco Alves Cabrita <include@npf.deec.uc.pt> (maintainer)
Approved by:	erwin (mentor)
Security:	CVE-2006-6832, CVE-2006-6833, CVE-2006-6834
2007-01-17 23:17:56 +00:00
Renato Botelho
9ac5d9b326 - Update to 1.0.11
PR:		ports/102746
Submitted by:	Francisco Alves Cabrita <include@npf.deec.uc.pt> (maintainer)
Security:	VuXML: 0ab423e7-3822-11db-81e1-000e0c2e438a
2006-09-01 13:22:49 +00:00
Remko Lodder
70bfbcb0a8 Mark Joomla as FORBIDDEN, there are remote code execution vulnerabilities
within PEAR.php (as mentioned by the joomla developers).

The port should be upgraded to 1.0.11 to solve these issues, maintainer
had been informed.

With hat:	secteam
2006-08-30 12:37:21 +00:00
Martin Wilke
addf3250dc - Update to 1.0.10
- Which fixes several vulnerabilities

- Security: http://www.joomla.org/content/view/1511/78/

PR:		        ports/99601
Submitted by:	Francisco Alves Cabrita <include_at_npf.deec.uc.pt> (maintainer)
Approved by:	markus (co mentor)
2006-06-30 22:46:51 +00:00
Martin Wilke
e2bbb96850 Update to 1.0.9
PR:		ports/98987
Submitted by:	Francisco Alves Cabrita <include@npf.deec.uc.pt>
Approved by:	krion (mentor)
2006-06-18 19:35:00 +00:00
Pav Lucistnik
f3a1224ceb - Update to 1.0.8
PR:		ports/95266
Submitted by:	Francisco Alves Cabrita <include@npf.deec.uc.pt> (maintainer)
Prodded by:	the powers that are (wes)
2006-04-04 17:10:29 +00:00
Sam Lawrance
a7fb6717b8 Add missing PHP- session, gd, and pdf dependencies.
PR:		ports/92884
Submitted by:	Francisco Alves Cabrita <include@npf.pt.freebsd.org> (maintainer)
2006-02-11 02:35:04 +00:00
Tim Bishop
8d12a6498e - Update to 1.0.7
PR:		92406
Submitted by:	Piet Delport <pjd@satori.za.net>
Approved by:	maintainer
2006-01-28 13:00:48 +00:00
Edwin Groothuis
fd9b23d7a7 [SECURITY UPDATE]: Update for www/joomla 1.0.4 to 1.0.5
Security Vunerabilities - 1.0.5 Contains fixes for 1 Security Issue.
	Medium Level Threats:
	Hardened ability to use the contact component to proliferate spam.

Submitted by:	Francisco Alves Cabrita <include@npf.deec.uc.pt>
PR:		ports/91217
Security:	Security Vunerabilities - 1.0.5 Contains fixes for 1 Security Issue.
2006-01-02 21:37:27 +00:00
Sergey Matveychuk
5e955e4ec1 - Remove a junk file.
Asked by:	maintainer
2005-11-28 10:50:33 +00:00
Sergey Matveychuk
7932d9bc22 - Update to 1.0.4
It fixes 6 Security Vunerabilities:

Critical Level Threats
Potentional XSS injection through GET and other variables
 - Affects all previous versions of Joomla! and Mambo 4.5.2.3
Hardened SEF against XSS injection
 - Affects all previous versions of Joomla! and Mambo 4.5.2.3

Low Level Threats
Potential SQL injection in Polls modules through the Itemid variable
 - Affects all previous versions of Joomla! and Mambo 4.5.2.x series
Potential SQL injection in several methods in mosDBTable class
 - Affects all previous versions of Joomla! and Mambo 4.5.2.x series
Potential misuse of Media component file management functions
 - Affects all previous versions of Joomla! and Mambo 4.5.2.x series
Add search limit param (default of 50) to `Search` Mambots to prevent search flooding
 - Affects all previous versions of Joomla! and Mambo 4.5.2.x series

PR:		ports/89596
Submitted by:	Francisco Alves Cabrita (maintainer)
2005-11-28 07:30:34 +00:00
Edwin Groothuis
9c6e344b83 [NEW PORT] www/joomla: Content Management System
Joomla! is one of the most powerful Open Source Content
	Management Systems on the planet. It is used all over
	the world for everything from simple websites to complex
	corporate applications. Joomla! is easy to install,
	simple to manage, and reliable.

	WWW: http://www.joomla.org/

PR:		ports/87522
Submitted by:	Francisco Alves Cabrita <francisco@nortenet.pt>
2005-11-25 02:08:33 +00:00