lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <4AB21C4E.9040601@gmail.com> Date: Thu, 17 Sep 2009 21:23:58 +1000 From: bmgsec <bmgsec@...il.com> To: full-disclosure@...ts.grok.org.uk Subject: Quiksoft EasyMail 6 (AddAttachment) Remote Buffer Overflow Exploit -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 For the fun of it! http://www.bmgsec.com.au/advisory/48/ - -- bmgsec bmgsec [at] gmail.com www.bmgsec.com.au -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.9 (MingW32) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/ iEYEARECAAYFAkqyHE4ACgkQNAVu4Sd2XpXT7gCgvH1PRz76XNHp0wjr9d7Mtl/C /s0AoOXnQaXnQSFjl4iNHNcK49vZ9xRs =3AM6 -----END PGP SIGNATURE----- _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/