search for: 006

Displaying 20 results from an estimated 1120 matches for "006".

Did you mean: 2006
2010 Jun 01
3
problem with intToChar
...t;\n" "\n" "\r" "\003" "\v" "\v" "\v" [251] "\n" "\002" "\n" "\003" "\005" "\005" "\004" "\004" "\004" "\v" [261] "\006" "\f" "\003" "\n" "\003" "\003" "\001" "\002" "\002" "\v" [271] "\003" "\003" "\003" "\n" "\f" "\005" "\005" "\004"...
2013 Aug 16
2
[PATCH] xfstests: update filters and output of btrfs/006
The btrfs-progs tools changed the output: - 100GiB instead of 100GB - The number of spaces was changed Signed-off-by: Stefan Behrens <sbehrens@giantdisaster.de> --- common/filter | 2 +- common/filter.btrfs | 3 ++- tests/btrfs/006 | 6 +++--- tests/btrfs/006.out | 36 ++++++++++++++++++------------------ 4 files changed, 24 insertions(+), 23 deletions(-) diff --git a/common/filter b/common/filter index dbb1674..ee738ca 100644 --- a/common/filter +++ b/common/filter @@ -262,7 +262,7 @@ _filter_uuid() # Filter out sizes...
2013 Dec 16
0
AST-2013-006: Buffer Overflow when receiving odd length 16 bit SMS message
Asterisk Project Security Advisory - AST-2013-006 Product Asterisk Summary Buffer Overflow when receiving odd length 16 bit SMS message Nature of Advisory Buffer Overflow and Remote Crash...
2013 Dec 16
0
AST-2013-006: Buffer Overflow when receiving odd length 16 bit SMS message
Asterisk Project Security Advisory - AST-2013-006 Product Asterisk Summary Buffer Overflow when receiving odd length 16 bit SMS message Nature of Advisory Buffer Overflow and Remote Crash...
2017 Aug 31
0
AST-2017-006: Shell access command injection in app_minivm
Asterisk Project Security Advisory - AST-2017-006 Product Asterisk Summary Shell access command injection in app_minivm Nature of Advisory Unauthorized command execution Susceptibility Remote Authenticated Sessions...
2011 Apr 21
0
AST-2011-006: Asterisk Manager User Shell Access
Asterisk Project Security Advisory - AST-2011-006 Product Asterisk Summary Asterisk Manager User Shell Access Nature of Advisory Permission Escalation Susceptibility Remote Authenticated Sessions...
2019 Nov 21
0
AST-2019-006: SIP request can change address of a SIP peer.
Asterisk Project Security Advisory - AST-2019-006 Product Asterisk Summary SIP request can change address of a SIP peer. Nature of Advisory Denial of Service Susceptibility Remote Unauthenticated Sessions...
2014 Jun 12
0
AST-2014-006: Asterisk Manager User Unauthorized Shell Access
Asterisk Project Security Advisory - AST-2014-006 Product Asterisk Summary Asterisk Manager User Unauthorized Shell Access Nature of Advisory Permission Escalation Susceptibility Remote Authenticated Sessions...
2014 Jun 12
0
AST-2014-006: Asterisk Manager User Unauthorized Shell Access
Asterisk Project Security Advisory - AST-2014-006 Product Asterisk Summary Asterisk Manager User Unauthorized Shell Access Nature of Advisory Permission Escalation Susceptibility Remote Authenticated Sessions...
2011 Apr 21
1
AST-2011-006: Asterisk Manager User Shell Access
Asterisk Project Security Advisory - AST-2011-006 Product Asterisk Summary Asterisk Manager User Shell Access Nature of Advisory Permission Escalation Susceptibility Remote Authenticated Sessions...
2018 Feb 21
0
AST-2018-006: WebSocket frames with 0 sized payload causes DoS
Asterisk Project Security Advisory - AST-2018-006 Product Asterisk Summary WebSocket frames with 0 sized payload causes DoS Nature of Advisory Denial of Service Susceptibility Remote Unauthenticated Sessions...
2009 Sep 04
0
[Fwd: AST-2009-006: IAX2 Call Number Resource Exhaustion]
Hello, Just in case someone hasn't upgraded yet, and is using IAX2. -------- Original Message -------- Subject: AST-2009-006: IAX2 Call Number Resource Exhaustion Date: Thu, 03 Sep 2009 17:47:35 -0500 From: Asterisk Security Team <security at asterisk.org> To: bugtraq at securityfocus.com Asterisk Project Security Advisory - AST-2009-006 +----------------------------------------------------...
2012 Apr 23
0
AST-2012-006: Remote Crash Vulnerability in SIP Channel Driver
Asterisk Project Security Advisory - AST-2012-006 Product Asterisk Summary Remote Crash Vulnerability in SIP Channel Driver Nature of Advisory Remote Crash Susceptibility Remote Authenticated Sessions...
2016 Sep 08
0
AST-2016-006: Crash on ACK from unknown endpoint
Asterisk Project Security Advisory - AST-2016-006 Product Asterisk Summary Crash on ACK from unknown endpoint Nature of Advisory Remote Crash Susceptibility Remote unauthenticated sessions...
2007 Apr 03
0
DTMF via IAX ignored after a few seconds
...004 ISeqno: 005 Type: IAX Subclass: ACK Timestamp: 05623ms SCall: 00001 DCall: 00023 [64.2.142.31:4569] Rx-Frame Retry[ No] -- OSeqno: 005 ISeqno: 004 Type: DTMF_E Subclass: 1 Timestamp: 05783ms SCall: 00023 DCall: 00001 [64.2.142.31:4569] Tx-Frame Retry[-01] -- OSeqno: 004 ISeqno: 006 Type: IAX Subclass: ACK Timestamp: 05783ms SCall: 00001 DCall: 00023 [64.2.142.31:4569] #=================================================================== The tones for 411 above work fine and call is routed to the directory app == CDR updated on IAX2/vitel-inbound-1 -- Exec...
2007 Jun 20
5
0.23 question
I think that I''m running into the warning on external node support here but after a recent upgrade for my puppetmaster I get: puppetmasterd[19397]: Could not find aa0-006-4.foo.com with names aa0-006-4.foo.com, aa0-006-4 I''ve not changed puppetd.conf which contains: ldapnodes = true ldapserver = my.ldap.foo.com ldapbase = ou=hosts,dc=foo,dc=com I''ve not explicitly set external_nodes (so it stays false). What else needs to be done? Cheers...
2005 Apr 06
1
%U doesn't work in root postexec
Hi! I've following in my smb.conf root postexec = /bin/rm /hades/samba/netlogon/scripts/%U.bat but I get following in my logfile: [2005/04/06 13:55:39, 1] smbd/service.c:close_cnum(836) hitt-006 (10.16.69.21) closed connection to service penzrobe [2005/04/06 13:55:39, 1] smbd/service.c:close_cnum(836) hitt-006 (10.16.69.21) closed connection to service netlogon /bin/rm: cannot remove `/hades/samba/netlogon/scripts/.bat': No such file or directory [2005/04/06 13:55:56, 1] smbd/service...
2002 Jun 28
1
Problem in optim(method="L-BFGS-B") (PR#1717)
...istance to the stationary point = 1.4763e-001 Cauchy X = -3.18017 6.51477 0.97505 15.259 ---------------- exit CAUCHY---------------------- 4 variables are free at GCP on iteration 12 # !!!!!!!!!!!!!!!!!!!!!! LINE SEARCH 0 times; norm of step = 2.30637 X = -3.90499 7.26709 1e-006 16.8712 G = 2.86794e+006 2.02055e+006 -4.1147e+009 -0.191468 iterations 12 function evaluations 15 segments explored during Cauchy searches 12 BFGS updates skipped 0 active bounds at final generalized Cauchy point 0 norm of the final projected gradient 4.1147e+009 final function value 4.1188e+00...
2007 Nov 25
2
2007-006 Ruby SSL Update on Debian
Hi *! Just a heads up. The recent issues with the Ruby SSL Security Fix are now available on Debian too. I''ve updated the infos on http://reductivelabs.com/trac/puppet/wiki/RubySSL-2007-006 Summary: DSA 1410-1 and DSA 1411-1 updating ruby1.8 to 1.8.5-4etch1 cause puppet to fail, if the puppetmaster has no certificate matching the value of the client''s "server" parameter, which is "puppet" by default. Regards, David
2004 Oct 06
0
iax2, strange native bridge problem????
...: 330561062 Tx-Frame Retry[000] -- OSeqno: 001 ISeqno: 005 Type: IAX Subclass: TXREQ Timestamp: 03368ms SCall: 00008 DCall: 17188 [62.178.166.159:4569] APPARENT ADDRES : IPV4 80.141.107.154:4569 CALL NUMBER : 3 TRANSFER ID : 330561062 Tx-Frame Retry[000] -- OSeqno: 006 ISeqno: 002 Type: VOICE Subclass: 2 Timestamp: 03442ms SCall: 00007 DCall: 00003 [80.141.107.154:4569] Rx-Frame Retry[Yes] -- OSeqno: 002 ISeqno: 001 Type: IAX Subclass: UNQULCH Timestamp: 03250ms SCall: 17188 DCall: 00008 [62.178.166.159:4569] Tx-Frame Retry[-01] -- OSeqno: 001 I...