similar to: [RHSA-1999:039-01] New netscape packages available

Displaying 20 results from an estimated 1000 matches similar to: "[RHSA-1999:039-01] New netscape packages available"

1999 Oct 04
0
SuSE Security Announcement - mirror
-----BEGIN PGP SIGNED MESSAGE----- ______________________________________________________________________________ SuSE Security Announcement Package: mirror-2.8.f4 Date: Fri Oct 01 22:21:15 MEST 1999 Affected: all Linux distributions using mirror <= 2.8.f4 _____________________________________________________________________________ A
2000 Jul 31
0
[RHSA-2000:046-02] New netscape packages available to fix JPEG problem
--------------------------------------------------------------------- Red Hat, Inc. Security Advisory Synopsis: New netscape packages available to fix JPEG problem Advisory ID: RHSA-2000:046-02 Issue date: 2000-07-28 Updated on: 2000-07-28 Product: Red Hat Linux Keywords: netscpae JPEG Cross references: N/A
2000 Aug 18
0
[RHSA-2000:054-01] New Netscape packages fix Java security hole
--------------------------------------------------------------------- Red Hat, Inc. Security Advisory Synopsis: New Netscape packages fix Java security hole Advisory ID: RHSA-2000:054-01 Issue date: 2000-08-18 Updated on: 2000-08-18 Product: Red Hat Linux Keywords: Brown Orifice netscape java Cross references: N/A
2000 May 19
1
[RHSA-2000:028-02] Netscape 4.73 available
--------------------------------------------------------------------- Red Hat, Inc. Security Advisory Synopsis: Netscape 4.73 available Advisory ID: RHSA-2000:028-02 Issue date: 2000-05-19 Updated on: 2000-05-19 Product: Red Hat Linux Keywords: netscape SSL telnet rlogin Cross references:
2000 Aug 01
0
MDKSA-2000:027 netscape update
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ________________________________________________________________________ Linux-Mandrake Security Update Advisory ________________________________________________________________________ Package name: netscape Date: July 31st, 2000 Advisory ID: MDKSA-2000:027 Affected versions: 6.0, 6.1, 7.0, 7.1
2000 Aug 01
0
MDKSA-2000:027-1 netscape update
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ________________________________________________________________________ Linux-Mandrake Security Update Advisory ________________________________________________________________________ Package name: netscape Date: August 1st, 2000 Original Advisory Date: July 31st, 2000 Advisory ID: MDKSA-2000:027-1 Affected versions: 6.0, 6.1,
2000 Jun 23
0
[RHSA-2000:039-02] remote root exploit (SITE EXEC) fixed
--------------------------------------------------------------------- Red Hat, Inc. Security Advisory Synopsis: remote root exploit (SITE EXEC) fixed Advisory ID: RHSA-2000:039-02 Issue date: 2000-06-23 Updated on: 2000-06-23 Product: Red Hat Linux Keywords: wu-ftpd, root exploit, site exec, buffer overrun Cross references: N/A
2000 Aug 18
0
[RHSA-2000:052-04] Zope update
--------------------------------------------------------------------- Red Hat, Inc. Security Advisory Synopsis: Zope update Advisory ID: RHSA-2000:052-04 Issue date: 2000-08-11 Updated on: 2000-08-18 Product: Red Hat Powertools Keywords: Zope Cross references: N/A
2000 Jun 09
0
Security Update: flaws in the SSL transaction handling of Netscape
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ______________________________________________________________________________ Caldera Systems, Inc. Security Advisory Subject: flaws in the SSL transaction handling of Netscape Advisory number: CSSA-2000-017.0 Issue date: 2000 June, 09 Cross reference:
2000 Feb 18
1
Netscape Profiles
There was a posting on Netscape Profiles mapped to network drives that I was hoping someone could help me with. Other than setting the key for password encryption, I've never messed with the NT registry keys. I see this folder: \Registry\Machine\SOFTWARE\Netscape\Netscape Navigator\Users = But making this part, I could use some help: CurrentUser = Default
2003 May 26
1
portupgrade issue
I am running 4.8-STABLE. I recently did a cvsup (repeatedly, most recently today). Ever since, portupgrade dies with the following messages: zircon# portupgrade -r pkgconfig /usr/local/lib/ruby/site_ruby/1.6/pkgdb.rb:310:in `deorigin': failed to convert nil into String (PkgDB::DBError) from /usr/local/lib/ruby/site_ruby/1.6/pkgdb.rb:903:in `tsort_build' from
2000 Jul 28
0
MDKSA-2000:026 Zope update
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ________________________________________________________________________ Linux-Mandrake Security Update Advisory ________________________________________________________________________ Package name: Zope Date: July 28th, 2000 Advisory ID: MDKSA-2000:026 Affected versions: 7.1
2007 Apr 04
1
seamonkey on Centos 2.1 deletes itself!
Well, partly: I've been "converting" a RHL 7.3 system to approximately Centos 2.1, so found it necessary to "rpm -Va" I was more than a little surprised at this: [root at magpie root]# rpm -V seamonkey missing /usr/lib/mozilla-seamonkey-1.0.8/chrome/overlayinfo/browser missing /usr/lib/mozilla-seamonkey-1.0.8/chrome/overlayinfo/browser/content missing
1999 Oct 12
0
SECURITY: RHSA-1999:040 New PAM packages available
-----BEGIN PGP SIGNED MESSAGE----- - --------------------------------------------------------------------- Red Hat, Inc. Security Advisory Synopsis: New PAM packages available Advisory ID: RHSA-1999:040 Issue date: 10/13/1999 Updated on: 10/13/1999 Keywords: pam security login NIS server Cross references: N/A -
1999 Aug 31
0
[SECURITY] RHSA-1999:034 New proftpd packages available
-----BEGIN PGP SIGNED MESSAGE----- - --------------------------------------------------------------------- Red Hat, Inc. Security Advisory Synopsis: Buffer overflow in proftpd Advisory ID: RHSA-1999:034-01 Issue date: 1999-08-31 Keywords: proftpd buffer overflow remote exploit - --------------------------------------------------------------------- 1. Topic: proftpd is a ftp server
1999 Jul 24
0
[RHSA-1999:023-01] Potential security problem in gnumeric 0.23
--------------------------------------------------------------------- Red Hat, Inc. Security Advisory Synopsis: Potential security problem in gnumeric 0.23 Advisory ID: RHSA-1999:023-01 Issue date: 1999-07-23 Keywords: gnumeric security --------------------------------------------------------------------- 1. Topic: A potential security problem has been fixed in the gnumeric spreadsheet
1999 Jul 30
0
[RHSA-1999:025-01] Potential misuse of squid cachemgr.cgi
--------------------------------------------------------------------- Red Hat, Inc. Security Advisory Synopsis: Potential misuse of squid cachemgr.cgi Advisory ID: RHSA-1999:025-01 Issue date: 1999-07-29 Updated on: Keywords: squid cachemgr.cgi connect Cross references: --------------------------------------------------------------------- 1. Topic: cachemgr.cgi, the manager
1999 Sep 13
0
[RHSA-1999:037-01] Buffer overflow in mars_nwe
--------------------------------------------------------------------- Red Hat, Inc. Security Advisory Synopsis: Buffer overflow in mars_nwe Advisory ID: RHSA-1999:037-01 Issue date: 1999-09-13 Updated on: Keywords: mars_nwe buffer Cross references: --------------------------------------------------------------------- 1. Topic: There are several buffer overruns in the mars_nwe
1999 Nov 10
0
[RHSA-1999:053-01] new NFS server pacakges available (5.2, 4.2)
--------------------------------------------------------------------- Red Hat, Inc. Security Advisory Synopsis: new NFS server packages available (5.2, 4.2) Advisory ID: RHSA-1999:053-01 Issue date: 1999-11-11 Updated on: 1999-11-11 Keywords: nfs-server PATH_MAX NAME_MAX rpc.nfsd Cross references: Bugtraq id #782 --------------------------------------------------------------------- 1.
1999 Aug 30
0
SECURITY: RHSA-1999:032 Buffer overflows in amd
-----BEGIN PGP SIGNED MESSAGE----- - --------------------------------------------------------------------- Red Hat, Inc. Security Advisory Synopsis: Buffer overrun in amd Advisory ID: RHSA-1999:032-01 Issue date: 1999-08-30 Keywords: amd am-utils buffer overflow remote exploit - --------------------------------------------------------------------- 1. Topic: New packages of am-utils