Closed dexter-sec closed 2 years ago
Interesting... the conn.log
history value is "history"=>"ShADTrrrrrrrrrrrrrrrrrrrrrrrrr"
which causes the calculation for the tcpflags value to overflow. I will cap it, expect a commit for the next release.
Closed as fixed in upcoming v6.3.0 release
š Summary
after install and build, everything running good except this error,
i have no idea, why [tcpflags.rst] set and parse '1000000000000000000000000' how do i change [tcpflags.rst] type and any idea handle this error? plz help me :(