Displaying 15 results from an estimated 15 matches for "xforce".
Did you mean:
force
2007 Mar 03
2
format of summary.lm for 2-way ANOVA
Hi,
I am performing a two-way ANOVA (2 factors with 4 and 5 levels,
respectively). If I'm interpreting the output of summary correctly,
then the interaction between both factors is significant:
,----
| ## Two-way ANOVA with possible interaction:
| > model1 <- aov(log(y) ~ xForce*xVel, data=mydataset)
|
| > summary(model1)
| Df Sum Sq Mean Sq F value Pr(>F)
| xForce 3 16.640 5.547 19.0191 1.708e-11 ***
| xVel 4 96.391 24.098 82.6312 < 2.2e-16 ***
| xForce:xVel 12 10.037 0.836 2.8681 0.0008528 ***
| Residuals 371 108....
1999 Jun 09
0
Fwd: ISSalert: ISS Security Advisory: KDE K-Mail File Creation Vulnerability
FYI, for those who may not have heard about this one. I got this from
another mailing list as is evident by the headers.
>Delivered-To: alert-out-link@iss.net
>Delivered-To: alert-out@iss.net
>Date: Wed, 9 Jun 1999 16:16:41 -0400 (EDT)
>From: X-Force <xforce@iss.net>
>To: alert@iss.net
>cc: X-Force <xforce@iss.net>
>Subject: ISSalert: ISS Security Advisory: KDE K-Mail File Creation
>Vulnerability
>Sender: owner-alert@iss.net
>Reply-To: X-Force <xforce@iss.net>
>X-Loop: alert
>
>
>TO UNSUBSCRIBE: email "...
2004 Jun 02
1
xdm security hole
Hi everyone,
every comment about this:
http://xforce.iss.net/xforce/xfdb/16264
Didn't find any hint or patch on http://www.xfree86.org/security/.
Best regards
Konrad Heuer (kheuer2@gwdg.de) ____ ___ _______
GWDG / __/______ ___ / _ )/ __/ _ \
Am Fassberg / _// __/ -_) -_) _ |\ \/ // /
3...
2003 Oct 06
1
vixie cron issue.
Well i haven't seen anyone talk about this, so i was just wondering
if FreeBSD is affected by this.
http://xforce.iss.net/xforce/xfdb/6508
[da@securityfocus.com: ISS Security Brief: ProFTPD ASCII File Remote Compromise Vulnerability (fwd)]
2003 Sep 23
2
[da@securityfocus.com: ISS Security Brief: ProFTPD ASCII File Remote Compromise Vulnerability (fwd)]
Recent proftpd security vulnerability release FYI. Ports has latest
patched proftpd distribution.
--
Jez
http://www.munk.nu/
-------------- next part --------------
An embedded message was scrubbed...
From: Dave Ahmad <da@securityfocus.com>
Subject: ISS Security Brief: ProFTPD ASCII File Remote Compromise
Vulnerability (fwd)
Date: Tue, 23 Sep 2003 10:25:54 -0600 (MDT)
Size: 4588
Url:
2004 Jul 09
1
NUL characters in POP3 conversation cause Outlook to hang
...Outlook bug [1,2] that is triggered by a NUL
character in a message being sent through POP3. I see that dovecot's
imap implementation converts 0x00 to 0x80, but this conversion is not
done for POP3. Would it be possible to add an option to do this mapping
for POP3 as well?
Matt
[1] http://xforce.iss.net/xforce/xfdb/15859
[2] http://www.derkeiler.com/Mailing-Lists/NT-Bugtraq/2004-04/0014.html
2007 Feb 08
0
security issues of aio
...| # Use real implementations of the aio_* system calls. There are numerous
| # stability and security issues in the current aio code that make it
| # unsuitable for inclusion on machines with untrusted local users.
| options VFS_AIO
Are there still problems with aio?
I only found http://xforce.iss.net/xforce/xfdb/7693, but no
advisory or other hint that this was fixed (I think I must have missed
that somehow). And some closed PRs about fixed problems.
Do these affect aio.ko as well?
Thanks,
Nicolas
--
http://www.rachinsky.de/nicolas
2005 Apr 22
0
FreeBSD Security Advisory FreeBSD-SA-05:05.cvs
...1.1.1.13.4.1
src/contrib/cvs/src/rcs.c 1.27.4.1
- -------------------------------------------------------------------------
VII. References
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0753
http://secunia.com/advisories/14976/
http://xforce.iss.net/xforce/xfdb/20148
The latest revision of this advisory is available at
ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-05:05.cvs.asc
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.0 (FreeBSD)
iD8DBQFCaUaaFdaIBMps37IRAvkoAJ47xsv+CGE12jJxGRMZrS8nFgx9XQCfVs5W
ZqGIq4p/ylx2yUZv...
2005 Apr 22
0
FreeBSD Security Advisory FreeBSD-SA-05:05.cvs
...1.1.1.13.4.1
src/contrib/cvs/src/rcs.c 1.27.4.1
- -------------------------------------------------------------------------
VII. References
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0753
http://secunia.com/advisories/14976/
http://xforce.iss.net/xforce/xfdb/20148
The latest revision of this advisory is available at
ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-05:05.cvs.asc
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.0 (FreeBSD)
iD8DBQFCaUaaFdaIBMps37IRAvkoAJ47xsv+CGE12jJxGRMZrS8nFgx9XQCfVs5W
ZqGIq4p/ylx2yUZv...
2002 Jun 26
2
MAP_ANON replacement?
Here I would like to suggest a replacement for MAP_ANON on systems which
do not have it, such as Solaris < 8. In "man mmap" of Solaris 8:
When MAP_ANON is set in flags, and fd is set to -1, mmap()
provides a direct path to return anonymous pages to the
caller. This operation is equivalent to passing mmap() an
open file descriptor on /dev/zero with
1999 Apr 05
0
site poll.
...; Samba and Network Development </a>
<a href="http://samba.org" > Samba Web site </a>
=====================================================================
Luke Kenneth Casson Leighton | Direct Dial : (678) 443-6183
Systems Engineer / ISS XForce Team | ISS Front Desk: (678) 443-6000
Internet Security Systems, Inc. | ISS Fax : (678) 443-6477
http://www.iss.net/ *Adaptive Network Security for the Enterprise*
ISS Connect - International User Conference - May '99
================================================...
1999 Apr 20
0
WANTED: Technical NT Security Info
...; Samba and Network Development </a>
<a href="http://samba.org" > Samba Web site </a>
=====================================================================
Luke Kenneth Casson Leighton | Direct Dial : (678) 443-6183
Systems Engineer / ISS XForce Team | ISS Front Desk: (678) 443-6000
Internet Security Systems, Inc. | ISS Fax : (678) 443-6477
http://www.iss.net/ *Adaptive Network Security for the Enterprise*
ISS Connect - International User Conference - May '99
================================================...
2003 Jul 01
1
tcp 22 > tcp 22
Hi,
I spotted today following line at my FreeBSD 4.6.2-RELEASE IPFIREWALL log:
Jul 1 13:34:35 fbsd /kernel: ipfw: 1400 Accept TCP xxxxxx:22 yyyyy:22 in via
ed1
where xxxxxx is the attacker's IP and yyyyy is my box.
But in sshd log, there are no traces left behind by this connection.
Normally, there is "Did not receive identification string from xxx" etc, when
somebody tries to
2002 Aug 28
0
FreeBSD Security Notice FreeBSD-SN-02:05
...-----------------------------------------------------------+
Port name: krb5
Affected: versions < krb5-1.2.5_2
Status: Fixed
Contains an overflow in Sun RPC XDR decoder.
<URL:http://online.securityfocus.com/archive/1/285308>
<URL:http://bvlive01.iss.net/issEn/delivery/xforce/alertdetail.jsp?oid=20823>
<URL:http://web.mit.edu/kerberos/www/advisories/MITKRB5-SA-2002-001-xdr.txt>
+------------------------------------------------------------------------+
Port name: linux-netscape6, netscape7, linux-mozilla, and mozilla
Affected: versions < mozilla-1....
2003 Apr 17
1
[Fwd: CERT Advisory CA-2003-13 Multiple Vulnerabilities in Snort Preprocessors]
...ing normalized against
> the current packet size, leading to an overflow condition. The RPC
> preprocessor is enabled by default.
>
> For additional information, please read the ISS X-Force advisory
> located at
>
> http://www.iss.net/issEn/delivery/xforce/alertdetail.jsp?oid=21951
>
> This vulnerability affects Snort versions 1.8.x through 1.9.1 and
> version 2.0 Beta.
>
> II. Impact
>
> Both VU#139129 and VU#916785 allow remote attackers to execute
> arbitrary code with the privileges of the...