-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
is there any more information on this "potential" remote vulnerability? fetchmail-6.1.0 (Sun Sep 22 18:31:23 EDT 2002), 21999 lines: * Updated French translation. * Stefan Esser's fix for potential remote vulnerability in multidrop mode. This is an important security fix! -----BEGIN PGP SIGNATURE----- Version: Hush 2.1 Note: This signature can be verified at https://www.hushtools.com wloEARECABoFAj2PTckTHG11dGV4QGh1c2htYWlsLmNvbQAKCRBLR9YdGwjQEGCjAJ9j dQWGysbUyLbds8ov0c7trraFswCfSoAdWbhdWhiLD+QJTYnJBRZpz3Q= =LBY3 -----END PGP SIGNATURE----- Get your free encrypted email at https://www.hushmail.com _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html