Displaying 20 results from an estimated 327 matches for "issing".
Did you mean:
missing
1999 Jun 09
0
Fwd: ISSalert: ISS Security Advisory: KDE K-Mail File Creation Vulnerability
FYI, for those who may not have heard about this one. I got this from
another mailing list as is evident by the headers.
>Delivered-To: alert-out-link@iss.net
>Delivered-To: alert-out@iss.net
>Date: Wed, 9 Jun 1999 16:16:41 -0400 (EDT)
>From: X-Force <xforce@iss.net>
>To: alert@iss.net
>cc: X-Force <xforce@iss.net>
>Subject: ISSalert: ISS Security Advisory: KDE
2019 Apr 28
2
Inno Setup 6.0.2 fails before creating exe file on Windows (R-3.6.0)
I am working on compiling R-3.6.0 for Windows 10 64bit using rtools40
(beta 11). I had also installed the most recent update of Inno setup,
which is now 6.0.2.With that version, `make risntaller` fails at the
call to ""C:/R/Inno/iscc" R.iss > R-3.6.0.log 2>&1" and just exits,
pointing to line 175 of the makefile which is:
$(RPREFIX)-win.exe: R.iss
2008 Apr 21
1
[LLVMdev] newbie with pass registering Problem
Hi!!
This is my first time with llvm. I'm still learning and really need help.
I wrote only one Function Pass, which uses another Function Pass (blockNrs), and registered this:
RegisterPass<FunctionAnalysis> X("gasched", "Genom Scheduling Pass");
When I compile my sourcecode, everything was okay. But when I tried to test it, i got this error Message:
nicole at
[da@securityfocus.com: ISS Security Brief: ProFTPD ASCII File Remote Compromise Vulnerability (fwd)]
2003 Sep 23
2
[da@securityfocus.com: ISS Security Brief: ProFTPD ASCII File Remote Compromise Vulnerability (fwd)]
Recent proftpd security vulnerability release FYI. Ports has latest
patched proftpd distribution.
--
Jez
http://www.munk.nu/
-------------- next part --------------
An embedded message was scrubbed...
From: Dave Ahmad <da@securityfocus.com>
Subject: ISS Security Brief: ProFTPD ASCII File Remote Compromise
Vulnerability (fwd)
Date: Tue, 23 Sep 2003 10:25:54 -0600 (MDT)
Size: 4588
Url:
2008 Aug 13
2
[LLVMdev] llvm-gcc bootstrap failure
...unk.official.opt/x86_64-unknown-linux-gnu/x86_64-unknown-linux-gnu/include
-isystem /cray/iss/compiler/cost/tools/llvm-tools/llvm/install.trunk.official.opt/x86_64-unknown-linux-gnu/x86_64-unknown-linux-gnu/sys-include
-O2 -O2 -g -O2 -DIN_GCC -W -Wall -Wwrite-strings -Wstrict-prototypes
-Wmissing-prototypes -Wold-style-definition -isystem ./include -fPIC -g
-DHAVE_GTHR_DEFAULT -DIN_LIBGCC2 -D__GCC_FLOAT_NOT_NEEDED -I. -I.
-I/ptmp/dag/llvm-project.official/llvm-gcc-4.2/trunk/gcc
-I/ptmp/dag/llvm-project.official/llvm-gcc-4.2/trunk/gcc/.
-I/ptmp/dag/llvm-project.official/llvm-gcc-4.2/t...
2008 Aug 13
0
[LLVMdev] llvm-gcc bootstrap failure
...t/x86_64-unknown-linux-gnu/x86_64-unknown-linux-gnu/include
> -isystem /cray/iss/compiler/cost/tools/llvm-tools/llvm/install.trunk.official.opt/x86_64-unknown-linux-gnu/x86_64-unknown-linux-gnu/sys-include
> -O2 -O2 -g -O2 -DIN_GCC -W -Wall -Wwrite-strings -Wstrict-prototypes
> -Wmissing-prototypes -Wold-style-definition -isystem ./include -fPIC -g
> -DHAVE_GTHR_DEFAULT -DIN_LIBGCC2 -D__GCC_FLOAT_NOT_NEEDED -I. -I.
> -I/ptmp/dag/llvm-project.official/llvm-gcc-4.2/trunk/gcc
> -I/ptmp/dag/llvm-project.official/llvm-gcc-4.2/trunk/gcc/.
> -I/ptmp/dag/llvm-project.off...
2002 Jun 26
0
OpenSSH Security Advisory (adv.iss)
1. Versions affected:
All versions of OpenSSH's sshd between 2.9.9 and 3.3
contain an input validation error that can result in
an integer overflow and privilege escalation.
OpenSSH 3.4 and later are not affected.
OpenSSH 3.2 and later prevent privilege escalation
if UsePrivilegeSeparation is enabled in sshd_config.
OpenSSH 3.3 enables
2002 Jun 26
0
Revised OpenSSH Security Advisory (adv.iss)
This is the 2nd revision of the Advisory.
1. Versions affected:
Serveral versions of OpenSSH's sshd between 2.3.1 and 3.3
contain an input validation error that can result in an
integer overflow and privilege escalation.
All versions between 2.3.1 and 3.3 contain a bug in the
PAMAuthenticationViaKbdInt code.
All versions between 2.9.9 and 3.3
1999 Apr 20
0
WANTED: Technical NT Security Info
NT uses proprietary encryption mechanisms to protect passwords and to
authenticate users. There is no one source of information on these
schemes outside of Microsoft.
If anyone has any information on any of the following or any other topics
that they would like to see published as a White Paper, please contact
lkcl@iss.net.
The paper will include as comprehensive a list of these mechanisms as
2008 Apr 22
1
[LLVMdev] newbie with pass registering Problem
Hi!!
This is my first time with llvm. I'm still learning and really need help.
I wrote only one Function Pass, which uses another Function Pass (blockNrs), and registered this:
RegisterPass<FunctionAnalysis> X("gasched", "Genom Scheduling Pass");
When I compile my sourcecode, everything was okay. But when I tried to test it, i got this error Message:
nicole at
2009 Mar 11
0
[LLVMdev] New Validator Buildbot
On 2009-03-06 22:18, David Greene wrote:
> Thanks to Daniel, we have a new home for the validator buildbot. Thanks,
> Daniel!
>
> Go to http://google1.osuosl.org:8080 and have a look.
>
Looks like the x86_64 buildsbots are failing:
2002 Jun 26
1
Revised OpenSSH Security Advisory (adv.iss)
This is the 2nd revision of the Advisory.
1. Versions affected:
Serveral versions of OpenSSH's sshd between 2.3.1 and 3.3
contain an input validation error that can result in an
integer overflow and privilege escalation.
All versions between 2.3.1 and 3.3 contain a bug in the
PAMAuthenticationViaKbdInt code.
All versions between 2.9.9 and 3.3
2009 Mar 06
2
[LLVMdev] New Validator Buildbot
Thanks to Daniel, we have a new home for the validator buildbot. Thanks,
Daniel!
Go to http://google1.osuosl.org:8080 and have a look.
-Dave
2009 Mar 23
1
[LLVMdev] New Validator Buildbot
On Wednesday 11 March 2009 15:47, Török Edwin wrote:
> > Go to http://google1.osuosl.org:8080 and have a look.
>
> Looks like the x86_64 buildsbots are failing:
>
> /.AUTO/cray/iss.compiler/cost/tools/llvm-tools/x86_64-unknown-linux-gnu/bin
>/../lib/gcc/x86_64-unknown-linux-gnu/4.1.2/../../../../x86_64-unknown-linux-
>gnu/bin/ld:
>
2002 Jun 26
2
OpenSSH Security Advisory (adv.iss)
1. Versions affected:
All versions of OpenSSH's sshd between 2.9.9 and 3.3
contain an input validation error that can result in
an integer overflow and privilege escalation.
OpenSSH 3.4 and later are not affected.
OpenSSH 3.2 and later prevent privilege escalation
if UsePrivilegeSeparation is enabled in sshd_config.
OpenSSH 3.3 enables
2005 Mar 31
2
[Bug 1008] GSSAPI authentication failes with Round Robin DNS hosts
http://bugzilla.mindrot.org/show_bug.cgi?id=1008
Summary: GSSAPI authentication failes with Round Robin DNS hosts
Product: Portable OpenSSH
Version: -current
Platform: All
OS/Version: All
Status: NEW
Severity: normal
Priority: P2
Component: Kerberos support
AssignedTo: openssh-bugs at mindrot.org
2019 May 01
0
Inno Setup 6.0.2 fails before creating exe file on Windows (R-3.6.0)
Multiple people have now reported that the R installer does not build
with InnoSetup 6 (released last week). The inno log shows this error:
Error on line 12 in src\gnuwin32\installer\R.iss: Minimum NT version
specified by MinVersion must be at least 6.0. (Windows 2000/XP/Server
2003 are no longer supported.)
Compile aborted.
Hence to fix this, the "MinVersion" parameter in
1999 Apr 05
0
site poll.
occasionally i feel like i and other people would like to know how samba
is being used. if you feel so inclined, could people kindly let us know
some of the things below (pick one or more or all), such as:
- a brief description of your organisation.
- what you use samba for (e.g as file servers; login servers; backup
purposes or remote admin with smbclient or rpcclient).
- what version(s) of
2002 Jul 01
0
Revised OpenSSH Security Advisory
This is the 4th revision of the Advisory.
This document can be found at: http://www.openssh.com/txt/preauth.adv
1. Versions affected:
Serveral versions of OpenSSH's sshd between 2.3.1 and 3.3
contain an input validation error that can result in an
integer overflow and privilege escalation.
All versions between 2.3.1 and 3.3 contain a bug in the
2002 Jul 01
0
Revised OpenSSH Security Advisory
This is the 4th revision of the Advisory.
This document can be found at: http://www.openssh.com/txt/preauth.adv
1. Versions affected:
Serveral versions of OpenSSH's sshd between 2.3.1 and 3.3
contain an input validation error that can result in an
integer overflow and privilege escalation.
All versions between 2.3.1 and 3.3 contain a bug in the