lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <008501c7bf1e$1a922d20$6400a8c0@davidef069b52c>
Date: Thu, 5 Jul 2007 09:04:00 -0700
From: "David Matthews" <david@...ispr.com>
To: <full-disclosure@...ts.grok.org.uk>
Subject: Re: Yoggie Pico Pro Remote Code Execution
Further to Cody's discovery, I've been told by Yoggie that the vulnerability
has been dealt with and an update was sent out to all functioning Yoggies
that same day.
Content of type "text/html" skipped
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/