FreeBSD Ports: ezbounce

Summary
The remote host is missing an update to the system as announced in the referenced advisory.
Solution
Update your system with the appropriate patches or software upgrades. http://ezbounce.dc-team.com/ http://www.vuxml.org/freebsd/c480eb5e-7f00-11d8-868e-000347dd607f.html
Insight
The following package is affected: ezbounce CVE-2003-0510 Format string vulnerability in ezbounce 1.0 through 1.50 allows remote attackers to execute arbitrary code via the 'sessions' command.