appointing if this is not done for Debian as well.
On Wed, Aug 9, 2017 at 2:33 PM, Moritz Muehlenhoff <j...@debian.org> wrote:
> On Wed, Aug 09, 2017 at 02:16:54PM +0300, Noam Rathaus wrote:
> > Package: security.debian.org
> >
> > Currently the Debian OVAL lack (critical) informa
nd
- I can provide code on how to "harvest" the NVD NIST site for the
information, or take the information from NDV NIST's XML files (which they
provide)
--
Thanks,
Noam Rathaus
Beyond Security
PGP Key ID: 2D24B275B1EB4475 (Exp 2018-03)
Package: dumpasn1
Version: 20030222-2
Severity: normal
Hi,
It is possible to cause an off-by-one overflow in the ASN1_Item structure by
causing:
item-header[ i + index ] = ch;
To write to position 8 of the header by causing i+index to equal 8.
This is the file used:
ff d6 a3 54 84
Package: wordpress
Version: 1.5.2-1
Severity: normal
A cross site scripting vulnerability exists in Wordpress, the vulnerability
manifests itself only when viewed by IE, as Mozilla converts in the URL to
lt;
I attached a patch to resolve this issue.
# diff
-u
Cool.
On 9/19/05, Kai Hendry [EMAIL PROTECTED] wrote:
Thanks for the bug report.
I've forwarded this issue upstream on their BTS:
http://trac.wordpress.org/ticket/1686
Best wishes,
--
Thanks
Noam Rathaus
CTO
Beyond Security Ltd.
Join the SecuriTeam community on Orkut:
http
=WhatEver
On Tue August 30 2005 23:07, Martin Pitt wrote:
Hi Noam!
Noam Rathaus [2005-07-21 14:25 +0300]:
Trying to upgrade returns:
Setting up postgresql (7.4.7-6sarge1) ...
psql: could not connect to server: ?
Is the server running locally and accepting
connections
Package: postgresql
Version: 7.4.7-6sarge1
Severity: grave
Justification: renders package unusable
Trying to upgrade returns:
Setting up postgresql (7.4.7-6sarge1) ...
psql: could not connect to server: ÷�
Is the server running locally and accepting
connections on Unix domain
Package: logcheck
Version: 1.2.39
Severity: grave
Justification: renders package unusable
During installation the following is returned:
Setting up logcheck (1.2.39) ...
gpasswd: unknown user adm
adduser: `/usr/bin/gpasswd -M root,adm,daemon,logcheck adm' returned
error code 1. Aborting.
309 Feb 26 2004 uucp.log.0
-rw-rw-r-- 1 root utmp 21120 Jun 17 10:52 wtmp
-rw-rw-r-- 1 root utmp 17280 May 31 17:06 wtmp.1
Hope this help debug the issue.
--
Noam Rathaus
CTO
Beyond Security Ltd.
http://www.beyondsecurity.com
http://www.securiteam.com
--
To UNSUBSCRIBE
Hi,
On Tue June 21 2005 17:18, maximilian attems wrote:
tags 315071 moreinfo
thanks
On Tue, 21 Jun 2005, Noam Rathaus wrote:
See below:
# getent group adm
adm:x:4:root,adm,daemon
ok strange.
because of the failure i didn't expect logcheck there anyway.
but all my debian systems just
On Tue June 21 2005 18:10, maximilian attems wrote:
On Tue, 21 Jun 2005, Noam Rathaus wrote:
snipp
also what does this cmd run as root show:
# adduser logcheck adm
# adduser logcheck adm
Adding user `logcheck' to group `adm'...
gpasswd: unknown user adm
adduser: `/usr/bin
On Tue June 21 2005 18:34, maximilian attems wrote:
On Tue, 21 Jun 2005, Noam Rathaus wrote:
See below:
# getent group adm
adm:x:4:root,adm,daemon
ok guess it's bug #284688 from adduser.
what does cmd return?
$ getent passwd adm
# getent passwd adm
(Nothing)
adm is not a user
12 matches
Mail list logo