localhost:5000 system="cisco", leap=0, stratum=5, rootdelay=88.21, rootdispersion=108.54, peer=24960, refid=135.89.100.96, reftime=0xD80BB6B5.715ACDD8, poll=10, clock=0xD80BB78F.8931F3F6, phase=8.259, freq=-141.24, error=11.32 The following NTP variables were found from a readvar request: system="cisco", leap=0, stratum=5, rootdelay=88.21, rootdispersion=108.54, peer=24960, refid=135.89.100.96, reftime=0xD80BB6B5.715ACDD8, poll=10, clock=0xD80BB78F.8931F3F6, phase=8.259, freq=-141.24, error=11.32 localhost:6000 system="cisco", leap=0, stratum=5, rootdelay=88.21, rootdispersion=108.54, peer=24960, refid=135.89.100.96, reftime=0xD80BB6B5.715ACDD8, poll=10, clock=0xD80BB78F.8931F3F6, phase=8.259, freq=-141.24, error=11.32 The following NTP variables were found from a readvar request: system="cisco", leap=0, stratum=5, rootdelay=88.21, rootdispersion=108.54, peer=24960, refid=135.89.100.96, reftime=0xD80BB6B5.715ACDD8, poll=10, clock=0xD80BB78F.8931F3F6, phase=8.259, freq=-141.24, error=11.32 A flaw was found in the default error response for status code 400. This flaw could be used by an attacker to expose "httpOnly" cookies when no custom ErrorDocument is specified. APPLE-SA-2012-09-19-2 51706 CVE-2012-0053 RHSA-2012:0128 48551 http://httpd.apache.org/security/vulnerabilities_20.html http://httpd.apache.org/security/vulnerabilities_22.html Apache Apache HTTP Server Web Apache HTTPD >= 2.0 and < 2.0.65 Download and apply the upgrade from: Many platforms and distributions provide pre-built binary packages for Apache HTTP server. These pre-built packages are usually customized and optimized for a particular distribution, therefore we recommend that you use the packages if they are available for your operating system.