search for: xforc

Displaying 15 results from an estimated 15 matches for "xforc".

Did you mean: xform
2007 Mar 03
2
format of summary.lm for 2-way ANOVA
Hi, I am performing a two-way ANOVA (2 factors with 4 and 5 levels, respectively). If I'm interpreting the output of summary correctly, then the interaction between both factors is significant: ,---- | ## Two-way ANOVA with possible interaction: | > model1 <- aov(log(y) ~ xForce*xVel, data=mydataset) | | > summary(model1) | Df Sum Sq Mean Sq F value Pr(>F) | xForce 3 16.640 5.547 19.0191 1.708e-11 *** | xVel 4 96.391 24.098 82.6312 < 2.2e-16 *** | xForce:xVel 12 10.037 0.836 2.8681 0.0008528 *** | Residuals 371 108...
1999 Jun 09
0
Fwd: ISSalert: ISS Security Advisory: KDE K-Mail File Creation Vulnerability
FYI, for those who may not have heard about this one. I got this from another mailing list as is evident by the headers. >Delivered-To: alert-out-link@iss.net >Delivered-To: alert-out@iss.net >Date: Wed, 9 Jun 1999 16:16:41 -0400 (EDT) >From: X-Force <xforce@iss.net> >To: alert@iss.net >cc: X-Force <xforce@iss.net> >Subject: ISSalert: ISS Security Advisory: KDE K-Mail File Creation >Vulnerability >Sender: owner-alert@iss.net >Reply-To: X-Force <xforce@iss.net> >X-Loop: alert > > >TO UNSUBSCRIBE: email &quo...
2004 Jun 02
1
xdm security hole
Hi everyone, every comment about this: http://xforce.iss.net/xforce/xfdb/16264 Didn't find any hint or patch on http://www.xfree86.org/security/. Best regards Konrad Heuer (kheuer2@gwdg.de) ____ ___ _______ GWDG / __/______ ___ / _ )/ __/ _ \ Am Fassberg / _// __/ -_) -_) _ |\ \/ // /...
2003 Oct 06
1
vixie cron issue.
Well i haven't seen anyone talk about this, so i was just wondering if FreeBSD is affected by this. http://xforce.iss.net/xforce/xfdb/6508
2003 Sep 23
2
[da@securityfocus.com: ISS Security Brief: ProFTPD ASCII File Remote Compromise Vulnerability (fwd)]
Recent proftpd security vulnerability release FYI. Ports has latest patched proftpd distribution. -- Jez http://www.munk.nu/ -------------- next part -------------- An embedded message was scrubbed... From: Dave Ahmad <da@securityfocus.com> Subject: ISS Security Brief: ProFTPD ASCII File Remote Compromise Vulnerability (fwd) Date: Tue, 23 Sep 2003 10:25:54 -0600 (MDT) Size: 4588 Url:
2004 Jul 09
1
NUL characters in POP3 conversation cause Outlook to hang
...Outlook bug [1,2] that is triggered by a NUL character in a message being sent through POP3. I see that dovecot's imap implementation converts 0x00 to 0x80, but this conversion is not done for POP3. Would it be possible to add an option to do this mapping for POP3 as well? Matt [1] http://xforce.iss.net/xforce/xfdb/15859 [2] http://www.derkeiler.com/Mailing-Lists/NT-Bugtraq/2004-04/0014.html
2007 Feb 08
0
security issues of aio
...| # Use real implementations of the aio_* system calls. There are numerous | # stability and security issues in the current aio code that make it | # unsuitable for inclusion on machines with untrusted local users. | options VFS_AIO Are there still problems with aio? I only found http://xforce.iss.net/xforce/xfdb/7693, but no advisory or other hint that this was fixed (I think I must have missed that somehow). And some closed PRs about fixed problems. Do these affect aio.ko as well? Thanks, Nicolas -- http://www.rachinsky.de/nicolas
2005 Apr 22
0
FreeBSD Security Advisory FreeBSD-SA-05:05.cvs
...1.1.1.13.4.1 src/contrib/cvs/src/rcs.c 1.27.4.1 - ------------------------------------------------------------------------- VII. References http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0753 http://secunia.com/advisories/14976/ http://xforce.iss.net/xforce/xfdb/20148 The latest revision of this advisory is available at ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-05:05.cvs.asc -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.0 (FreeBSD) iD8DBQFCaUaaFdaIBMps37IRAvkoAJ47xsv+CGE12jJxGRMZrS8nFgx9XQCfVs5W ZqGIq4p/ylx2yUZ...
2005 Apr 22
0
FreeBSD Security Advisory FreeBSD-SA-05:05.cvs
...1.1.1.13.4.1 src/contrib/cvs/src/rcs.c 1.27.4.1 - ------------------------------------------------------------------------- VII. References http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0753 http://secunia.com/advisories/14976/ http://xforce.iss.net/xforce/xfdb/20148 The latest revision of this advisory is available at ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-05:05.cvs.asc -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.0 (FreeBSD) iD8DBQFCaUaaFdaIBMps37IRAvkoAJ47xsv+CGE12jJxGRMZrS8nFgx9XQCfVs5W ZqGIq4p/ylx2yUZ...
2002 Jun 26
2
MAP_ANON replacement?
Here I would like to suggest a replacement for MAP_ANON on systems which do not have it, such as Solaris < 8. In "man mmap" of Solaris 8: When MAP_ANON is set in flags, and fd is set to -1, mmap() provides a direct path to return anonymous pages to the caller. This operation is equivalent to passing mmap() an open file descriptor on /dev/zero with
1999 Apr 05
0
site poll.
...; Samba and Network Development </a> <a href="http://samba.org" > Samba Web site </a> ===================================================================== Luke Kenneth Casson Leighton | Direct Dial : (678) 443-6183 Systems Engineer / ISS XForce Team | ISS Front Desk: (678) 443-6000 Internet Security Systems, Inc. | ISS Fax : (678) 443-6477 http://www.iss.net/ *Adaptive Network Security for the Enterprise* ISS Connect - International User Conference - May '99 ===============================================...
1999 Apr 20
0
WANTED: Technical NT Security Info
...; Samba and Network Development </a> <a href="http://samba.org" > Samba Web site </a> ===================================================================== Luke Kenneth Casson Leighton | Direct Dial : (678) 443-6183 Systems Engineer / ISS XForce Team | ISS Front Desk: (678) 443-6000 Internet Security Systems, Inc. | ISS Fax : (678) 443-6477 http://www.iss.net/ *Adaptive Network Security for the Enterprise* ISS Connect - International User Conference - May '99 ===============================================...
2003 Jul 01
1
tcp 22 > tcp 22
Hi, I spotted today following line at my FreeBSD 4.6.2-RELEASE IPFIREWALL log: Jul 1 13:34:35 fbsd /kernel: ipfw: 1400 Accept TCP xxxxxx:22 yyyyy:22 in via ed1 where xxxxxx is the attacker's IP and yyyyy is my box. But in sshd log, there are no traces left behind by this connection. Normally, there is "Did not receive identification string from xxx" etc, when somebody tries to
2002 Aug 28
0
FreeBSD Security Notice FreeBSD-SN-02:05
...-----------------------------------------------------------+ Port name: krb5 Affected: versions < krb5-1.2.5_2 Status: Fixed Contains an overflow in Sun RPC XDR decoder. <URL:http://online.securityfocus.com/archive/1/285308> <URL:http://bvlive01.iss.net/issEn/delivery/xforce/alertdetail.jsp?oid=20823> <URL:http://web.mit.edu/kerberos/www/advisories/MITKRB5-SA-2002-001-xdr.txt> +------------------------------------------------------------------------+ Port name: linux-netscape6, netscape7, linux-mozilla, and mozilla Affected: versions < mozilla-1...
2003 Apr 17
1
[Fwd: CERT Advisory CA-2003-13 Multiple Vulnerabilities in Snort Preprocessors]
...ing normalized against > the current packet size, leading to an overflow condition. The RPC > preprocessor is enabled by default. > > For additional information, please read the ISS X-Force advisory > located at > > http://www.iss.net/issEn/delivery/xforce/alertdetail.jsp?oid=21951 > > This vulnerability affects Snort versions 1.8.x through 1.9.1 and > version 2.0 Beta. > > II. Impact > > Both VU#139129 and VU#916785 allow remote attackers to execute > arbitrary code with the privileges of th...