Displaying 2 results from an estimated 2 matches for "056b".
Did you mean:
0562
2006 May 10
1
pop3 problem with small messages with no Subject: and no To: headers
...0 4624 16a1 E..0.&@.q...F$..
0x0010: ceaa 0f11 eb15 006e 7ee7 2a93 d845 fe0c .......n~.*..E..
0x0020: 5018 ffff 3618 0000 5245 5452 2039 0d0a P...6...RETR.9..
10:51:35.172177 IP mailserver.pop3 > customer.60181: P 1633:2980(1347)
ack 48 win 5840
0x0000: 4500 056b ca0b 4000 4006 3101 ceaa 0f11 E..k.. at .@.1.....
0x0010: 4624 16a1 006e eb15 d845 fe0c 7ee7 2a9b F$...n...E..~.*.
0x0020: 5018 16d0 3fde 0000 2b4f 4b20 3133 3237 P...?...+OK.1327
0x0030: 206f 6374 6574 730d 0a52 6574 7572 6e2d .octets..Return-
0x0040: 50...
2013 Mar 09
1
lang/ruby19: ruby-1.9.3.392,1 is vulnerable: ** [check-vulnerable] Error code 1
...to switch it off.
Can someone give a hint, please?
Regards,
Oliver
===> Cleaning for ruby-1.9.3.392,1
===> ruby-1.9.3.392,1 has known vulnerabilities:
ruby-1.9.3.392,1 is vulnerable:
Ruby -- XSS exploit of RDoc documentation generated by rdoc
WWW: http://portaudit.FreeBSD.org/d3e96508-056b-4259-88ad-50dc8d1978a6.html
ruby-1.9.3.392,1 is vulnerable:
Ruby -- Denial of Service and Unsafe Object Creation Vulnerability in JSON
WWW: http://portaudit.FreeBSD.org/c79eb109-a754-45d7-b552-a42099eb2265.html
=> Please update your ports tree and try again.
*** [check-vulnerable] Error code 1...