[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-Id: <20081107200354.09CEFE3050D@pasmtpB.tele.dk>
date: 7 Nov 2008 21:03:54 +0100
from: "Noren, Bill" <Bill.Noren@...Tec.com>
to: full-disclosure@...ts.grok.org.uk
Subject: OpticamFX 1.61 Gay Slut Overflow
Advisory 2008-11-19
Gay Slut Overflow in OpticamFX 1.61
I. BACKGROUND
Advisory marked for immediate release.
II. DESCRIPTION
When reading Full-Disclosure your inbox will suffer from a Gay Slut Overflow vulnerability
III. HISTORY
This advisory has no history.
IV. WORKAROUND
There are no known workarounds.
V. VENDOR RESPONSE
None.
VI. CVE INFORMATION
The Common Vulnerabilities and Exposures (CVE) project has assigned the
name CVE-2008-1446 to this issue.
CONTACT:
*Noren, Bill Bill.Noren@...Tec.com
*1-555-LOL-COCKDONGS
*CISSP GSAE CCE CEH CSFA GREM SSP-CNSA SSP-MPA GIPS GHTQ GWAS BACON LULZ
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists