Update to version 1.07 (unbreak port)

Approved by:	itetcu (mentor, implicit)
This commit is contained in:
Niels Heinen 2010-05-02 13:55:12 +00:00
parent b01db2d6b4
commit c19003bdf6
3 changed files with 31 additions and 20 deletions

View file

@ -6,7 +6,7 @@
#
PORTNAME= fuzzdb
PORTVERSION= 1.06
PORTVERSION= 1.07
CATEGORIES= security www
MASTER_SITES= ${MASTER_SITE_GOOGLE_CODE}
EXTRACT_SUFX= .tgz
@ -15,7 +15,7 @@ MAINTAINER= niels@FreeBSD.org
COMMENT= A comprehensive set of fuzzing patterns
NO_BUILD= yes
WRKSRC= ${WRKDIR}/${PORTNAME}
WRKSRC= ${WRKDIR}/${PORTNAME}-read-only
EXTRACT_AFTER_ARGS= | ${TAR} -xf - --exclude .svn
PORTDOCS= _copyright.txt _readme.txt
PORTDIRS= attack-payloads wordlists-misc discovery \

View file

@ -1,3 +1,3 @@
MD5 (fuzzdb-1.06.tgz) = 1ada03babaacd2aaf1b2f6aa92b619be
SHA256 (fuzzdb-1.06.tgz) = 421b9b2d38349086474fe605a145e7ce0541ab3f14e76e684ef8dda4b1717a11
SIZE (fuzzdb-1.06.tgz) = 2975557
MD5 (fuzzdb-1.07.tgz) = b14ced60948f1137a05416c7f1d45280
SHA256 (fuzzdb-1.07.tgz) = 2f03a6767356d056ddf319b2b8039d9320b1e92736aa5c2540dd491593dcd23c
SIZE (fuzzdb-1.07.tgz) = 4979702

View file

@ -39,17 +39,21 @@
%%DATADIR%%/attack-payloads/rfi/rfi-cheatsheet.html
%%DATADIR%%/attack-payloads/rfi/rfi.txt
%%DATADIR%%/attack-payloads/server-side-include/server-side-includes-generic.txt
%%DATADIR%%/attack-payloads/sql-injection/detect-generic/sql-injection-active.txt
%%DATADIR%%/attack-payloads/sql-injection/detect-generic/sql-injection-passive.txt
%%DATADIR%%/attack-payloads/sql-injection/detect-generic/sql-injection.txt
%%DATADIR%%/attack-payloads/sql-injection/detect-ms-sql/sql-injection-ms-sql-blind-ninja.txt
%%DATADIR%%/attack-payloads/sql-injection/detect-ms-sql/sql-injection-ms-sql.txt
%%DATADIR%%/attack-payloads/sql-injection/detect-mysql/sql-injection-mysql-ms-sql.txt
%%DATADIR%%/attack-payloads/sql-injection/detect-mysql/sql-injection-mysql.txt
%%DATADIR%%/attack-payloads/sql-injection/detect-oracle/sql-injection-oracle.txt
%%DATADIR%%/attack-payloads/sql-injection/docs.oracle_cheat.pdf
%%DATADIR%%/attack-payloads/sql-injection/docs.sql_injection_cheatsheet.html
%%DATADIR%%/attack-payloads/sql-injection/exploit/sql-injection-login-bypass-generic.txt
%%DATADIR%%/attack-payloads/sql-injection/detect/generic/sql-injection-active.txt
%%DATADIR%%/attack-payloads/sql-injection/detect/generic/sql-injection-passive.txt
%%DATADIR%%/attack-payloads/sql-injection/detect/generic/sql-injection.txt
%%DATADIR%%/attack-payloads/sql-injection/detect/ms-sql/sql-injection-ms-sql-blind-ninja.txt
%%DATADIR%%/attack-payloads/sql-injection/detect/ms-sql/sql-injection-ms-sql.txt
%%DATADIR%%/attack-payloads/sql-injection/detect/mysql/sql-injection-mysql-ms-sql.txt
%%DATADIR%%/attack-payloads/sql-injection/detect/mysql/sql-injection-mysql.txt
%%DATADIR%%/attack-payloads/sql-injection/detect/oracle/docs/docs.oracle_cheat.pdf
%%DATADIR%%/attack-payloads/sql-injection/detect/oracle/docs/docs.sql_injection_cheatsheet.html
%%DATADIR%%/attack-payloads/sql-injection/detect/oracle/sql-injection-oracle.txt
%%DATADIR%%/attack-payloads/sql-injection/exploit/db2-enumeration.txt
%%DATADIR%%/attack-payloads/sql-injection/exploit/ms-sql-enumeration.txt
%%DATADIR%%/attack-payloads/sql-injection/exploit/mysql-injection-login-bypass.txt
%%DATADIR%%/attack-payloads/sql-injection/exploit/mysql-read-local-files.txt
%%DATADIR%%/attack-payloads/sql-injection/exploit/postgres-enumeration.txt
%%DATADIR%%/attack-payloads/xml/xml-attacks.txt
%%DATADIR%%/attack-payloads/xpath/xpath-injection.txt
%%DATADIR%%/attack-payloads/xss/docs.wasc-scriptmapping/ScriptMapping_Release_26Nov2007.html
@ -80,8 +84,10 @@
%%DATADIR%%/discovery/generic/interesting-files-apache.txt
%%DATADIR%%/discovery/generic/interesting-files-coldfusion.txt
%%DATADIR%%/discovery/generic/interesting-files-hyperion.txt
%%DATADIR%%/discovery/generic/interesting-files-logins.txt
%%DATADIR%%/discovery/generic/interesting-files-lotus-notes.txt
%%DATADIR%%/discovery/generic/interesting-files-oracle-application-server.txt
%%DATADIR%%/discovery/generic/interesting-files-passwords.txt
%%DATADIR%%/discovery/generic/interesting-files-random.txt
%%DATADIR%%/discovery/generic/interesting-files-websphere.txt
%%DATADIR%%/discovery/generic/php-common-backdoors.txt
@ -201,10 +207,15 @@
@dirrm %%DATADIR%%/attack-payloads/xpath
@dirrm %%DATADIR%%/attack-payloads/xml
@dirrm %%DATADIR%%/attack-payloads/sql-injection/exploit
@dirrm %%DATADIR%%/attack-payloads/sql-injection/detect-oracle
@dirrm %%DATADIR%%/attack-payloads/sql-injection/detect-mysql
@dirrm %%DATADIR%%/attack-payloads/sql-injection/detect-ms-sql
@dirrm %%DATADIR%%/attack-payloads/sql-injection/detect-generic
@dirrm %%DATADIR%%/attack-payloads/sql-injection/detect/oracle/docs
@dirrm %%DATADIR%%/attack-payloads/sql-injection/detect/oracle
@dirrm %%DATADIR%%/attack-payloads/sql-injection/detect/mysql/docs
@dirrm %%DATADIR%%/attack-payloads/sql-injection/detect/mysql
@dirrm %%DATADIR%%/attack-payloads/sql-injection/detect/ms-sql/docs
@dirrm %%DATADIR%%/attack-payloads/sql-injection/detect/ms-sql
@dirrm %%DATADIR%%/attack-payloads/sql-injection/detect/generic/docs
@dirrm %%DATADIR%%/attack-payloads/sql-injection/detect/generic
@dirrm %%DATADIR%%/attack-payloads/sql-injection/detect
@dirrm %%DATADIR%%/attack-payloads/sql-injection
@dirrm %%DATADIR%%/attack-payloads/server-side-include
@dirrm %%DATADIR%%/attack-payloads/rfi