Unsuscribe

2018-12-15 Thread Fco. Moyano

Mit freudlichen Grüßen.

Herr Moyano


Re: Unsuscribe

2017-11-01 Thread SZÉPE Viktor

Specially made for unsubscribers: https://www.youtube.com/watch?v=LRT0Vt71v-c


Idézem/Quoting Jiadong Wang :


unsubscribe

On Wed, Nov 1, 2017 at 9:42 AM, Povl Ole Haarlev Olsen <
debian-secur...@stderr.dk> wrote:


On Wed, 1 Nov 2017, Daniel Hadfield wrote:


You need to use the web form:
https://www.debian.org/MailingLists/unsubscribe



Or send an email:

List-Unsubscribe:


NOTE: ...-request@... !

--
Povl Ole





--
Jiadong Wang
Harold S. Mohler Laboratory
Lehigh University
200 West Packer Avenue
Bethlehem, PA 18015-1582

Phone No: 484-707-8895




SZÉPE Viktor, honlap üzemeltetés
https://github.com/szepeviktor/debian-server-tools/blob/master/CV.md
--
+36-20-4242498  s...@szepe.net  skype: szepe.viktor
Budapest, III. kerület






Re: Unsuscribe

2017-11-01 Thread Vaughn Graham
misguidedRequest

On Wed, Nov 1, 2017 at 10:34 AM, Jiadong Wang  wrote:

> unsubscribe
>
> On Wed, Nov 1, 2017 at 9:42 AM, Povl Ole Haarlev Olsen <
> debian-secur...@stderr.dk> wrote:
>
>> On Wed, 1 Nov 2017, Daniel Hadfield wrote:
>>
>>> You need to use the web form:
>>> https://www.debian.org/MailingLists/unsubscribe
>>>
>>
>> Or send an email:
>>
>> List-Unsubscribe:
>> 
>>
>> NOTE: ...-request@... !
>>
>> --
>> Povl Ole
>>
>>
>
>
> --
> Jiadong Wang
> Harold S. Mohler Laboratory
> Lehigh University
> 200 West Packer Avenue
> 
> Bethlehem, PA 18015
> 
> -1582
>
> Phone No: 484-707-8895 <(484)%20707-8895>
>



-- 
-
*Vaughn Graham*
*Director of E-Innovations*
Domino Management Services LLC.
Ext: 19907 l.ed/19907


Re: Unsuscribe

2017-11-01 Thread Jiadong Wang
unsubscribe

On Wed, Nov 1, 2017 at 9:42 AM, Povl Ole Haarlev Olsen <
debian-secur...@stderr.dk> wrote:

> On Wed, 1 Nov 2017, Daniel Hadfield wrote:
>
>> You need to use the web form:
>> https://www.debian.org/MailingLists/unsubscribe
>>
>
> Or send an email:
>
> List-Unsubscribe:
> 
>
> NOTE: ...-request@... !
>
> --
> Povl Ole
>
>


-- 
Jiadong Wang
Harold S. Mohler Laboratory
Lehigh University
200 West Packer Avenue
Bethlehem, PA 18015-1582

Phone No: 484-707-8895


Re: Unsuscribe

2017-11-01 Thread Povl Ole Haarlev Olsen

On Wed, 1 Nov 2017, Daniel Hadfield wrote:

You need to use the web form:
https://www.debian.org/MailingLists/unsubscribe


Or send an email:

List-Unsubscribe:


NOTE: ...-request@... !

--
Povl Ole



Re: Unsuscribe

2017-11-01 Thread Daniel Hadfield

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

You need to use the web form:
https://www.debian.org/MailingLists/unsubscribe


On 01/11/17 13:55, Donald Haley wrote:
> Please unsuscribe me. > > Thanks
-BEGIN PGP SIGNATURE-

iQFIBAEBCgAyFiEErEVwVy+FOWKYCpbdrygR60hkMfgFAln53I0UHGRhbkBwaW5n
c3dlZXAuY28udWsACgkQrygR60hkMfiayQgAnKlYPiciiBRUwIerA4uM9fYEDEHS
ql4gwN8IsZpL2d9ArT5XW5sAmLrDK75P62P8SY9stiA1H82W+rOMAg0FNfMowd2m
T8O4RM++jjWEnF74FZHpESTZTCY9M62imCBZ3fnO+a2Ce49v0zFH/eC2AdIE1Vq7
1U6YNGp6nBJdGMtvnuv0voh6jmlOLia1uwpA6iB0D8HvcOsm7rY+6+22l9kAbjtc
+hkqD04QMvGEZxRlJB0QdzOZFZpXnukKq8Jyjkx+6lMuitep+MCE7hLrIUlKr4zV
K/vUc56Zbppk8IoJjjOHboCt9fvBuoCreLRiImBy1Cnnm1Y4m2Tucg3juw==
=ILyQ
-END PGP SIGNATURE-



Re: Unsuscribe

2017-11-01 Thread mysystemp
https://imgflip.com/i/1ym0x0

2017-11-01 14:56 GMT+01:00 Donald Haley :

> Please unsuscribe me.
>
> Thanks
>


Unsuscribe

2017-11-01 Thread Donald Haley
Please unsuscribe me. 

Thanks 


Unsuscribe

2017-11-01 Thread Donald Haley
Please unsuscribe me. 

Thanks 


Re: Unsuscribe

2017-10-31 Thread Paulo Deolindo
Unsubscribe.


--
Atenciosamente,

Paulo Roberto Deolindo Junior
Analista de Operações - Suporte - Digot
Tel.: 55 (21) 2442-9509

BB Tecnologia e Serviços
www.bbtecno.com.br<http://www.bbtecno.com.br>


De: William TOUZALIN 
Enviado: terça-feira, 31 de outubro de 2017 12:09:09
Para: Laurent Cordier
Cc: debian-security@lists.debian.org
Assunto: Re: Unsuscribe

À un B près: ça passait !
(ou pas)

Will-From-Tokyo


> On 2017/10/31, at 21:47, Laurent Cordier  wrote:
>
>
> --
> Laurent Cordier
> Administrateur Systèmes
> 06.71.96.39.24
> 1, rue guilbert
> 14000 CAEN
>
Esta mensagem pode conter informação confidencial e/ou privilegiada, sendo seu 
sigilo protegido por lei. Se você não for o destinatário ou a pessoa autorizada 
a receber esta mensagem, não pode usar, copiar ou divulgar as informações nela 
contidas ou tomar qualquer ação baseada nessas informações. Se você recebeu 
esta mensagem por engano, por favor, avise imediatamente ao remetente, 
respondendo o e-mail e em seguida apague-a. Agradecemos sua cooperação. This 
message may contain confidential and/or privileged information and its 
confidentiality protected by law. If you are not the address or authorized to 
receive this for the address, you must not use, copy, disclose or take any 
action based on this message or any information here in. If you have received 
this message in error, please advise the sender immediately by reply e-mail and 
delete this message. Thank you for your cooperation.


Re: Unsuscribe

2017-10-31 Thread William TOUZALIN
À un B près: ça passait !
(ou pas)

Will-From-Tokyo


> On 2017/10/31, at 21:47, Laurent Cordier  wrote:
> 
> 
> -- 
> Laurent Cordier
> Administrateur Systèmes
> 06.71.96.39.24
> 1, rue guilbert
> 14000 CAEN
> 


Unsuscribe

2017-10-31 Thread Laurent Cordier


--
Laurent Cordier
Administrateur Systèmes
06.71.96.39.24
1, rue guilbert
14000 CAEN



Re: Unsuscribe

2017-10-18 Thread Noor Christensen
On Mon, Oct 16, 2017 at 08:26:47PM -0400, Jocey Ricardo P閞ez S醤chez wrote:
> Enviado desde mi Huawei

Messages for subscribing/unsubscribing should be sent to this address:

debian-security-requ...@lists.debian.org

-- noor

|_|O|_|
|_|_|O|  Noor Christensen  
|O|O|O|  n...@fripost.org ~ 0x401DA1E0


signature.asc
Description: PGP signature


Unsuscribe

2017-10-17 Thread Jocey Ricardo P閞ez S醤chez


Enviado desde mi Huawei

Unsuscribe

2017-08-28 Thread Gustavo F. Paredes - LU2JGP
-- 

*"Per Aspera ad Astra"*
Gustavo F. Paredes Delaloye
Técnico en Computación.
Técnico Superior en Electrónica Digital y Control Automático.
Profesor para el Nivel Secundario en la Modalidad Técnico-Profesional.
Técnico Universitario en Automatización y Control de Procesos Industriales.
Matricula Nacional COPITEC T3018
My LinkedIn 
Skype: lu2jgp
lu2...@gmail.com
paredes...@copitec.org.ar
-- 



*Labalta 127Concepción del Uruguay, Entre RíosArgentina**Tel.: *+54 3442
443731
*Movil: *+54 9 3442 540623


Unsuscribe

2016-08-02 Thread Jocey Ricardo P閞ez S醤chez
Unsuscribe

Enviado desde mi Huawei

RE: remove email - unsuscribe

2016-04-14 Thread Philip Costello


Please remove my email from you system : 

nbe...@4gwireless.com 





-Original Message-
From: sebastien wey [mailto:sebastien_...@yahoo.fr] 
Sent: Thursday, April 14, 2016 8:20 AM
To: debian-security@lists.debian.org
Subject: remove email - unsuscribe

Please remove my email from you system :
sebastien_...@yahoo.fr



Re: remove email - unsuscribe

2016-04-14 Thread Franck Ridel
Hi Philip.

You can unsuscribe here :
https://www.debian.org/MailingLists/unsubscribe

Greetings

On Thu, Apr 14, 2016, 20:03 Philip Costello 
wrote:

>
>
> Please remove my email from you system :
>
> nbe...@4gwireless.com
>
>
>
>
>
> -Original Message-
> From: sebastien wey [mailto:sebastien_...@yahoo.fr]
> Sent: Thursday, April 14, 2016 8:20 AM
> To: debian-security@lists.debian.org
> Subject: remove email - unsuscribe
>
> Please remove my email from you system :
> sebastien_...@yahoo.fr
>
> --
Franck Ridel

http://franck-ridel.fr/
https://www.google.com/+FranckRidel


remove email - unsuscribe

2016-04-14 Thread sebastien wey
Please remove my email from you system :

sebastien_...@yahoo.fr



Re: unsuscribe

2016-01-25 Thread Vaughn Graham
https://www.debian.org/MailingLists/unsubscribe

Please see the form above to unsubscribe.

Cheers

On Sat, Jan 23, 2016 at 12:39 AM, Kopilous Kopilous 
wrote:

> Le 23 janv. 2016 07:31, "Ben Hutchings"  a écrit :
>
>> -BEGIN PGP SIGNED MESSAGE-
>> Hash: SHA512
>>
>> -
>> -
>> Debian Security Advisory DSA-3452-1   secur...@debian.org
>> https://www.debian.org/security/Ben Hutchings
>> January 23, 2016  https://www.debian.org/security/faq
>> -
>> -
>>
>> Package: claws-mail
>> CVE ID : CVE-2015-8614
>>
>> "DrWhax" of the Tails project reported that Claws Mail is missing
>> range checks in some text conversion functions.  A remote attacker
>> could exploit this to run arbitrary code under the account of a user
>> that receives a message from them using Claws Mail.
>>
>> For the oldstable distribution (wheezy), this problem has been fixed
>> in version 3.8.1-2+deb7u1.
>>
>> For the stable distribution (jessie), this problem has been fixed in
>> version 3.11.1-3+deb8u1.
>>
>> We recommend that you upgrade your claws-mail packages.
>>
>> Further information about Debian Security Advisories, how to apply
>> these updates to your system and frequently asked questions can be
>> found at: https://www.debian.org/security/
>>
>> Mailing list: debian-security-annou...@lists.debian.org
>> -BEGIN PGP SIGNATURE-
>> Version: GnuPG v1
>>
>> iQIcBAEBCgAGBQJWoxmeAAoJEAVMuPMTQ89EUJwP/jLpgiW3wqnjAjPJ53Ok72e9
>> UWtCI53YUbWLtaTv8sHQGvRw46ZIHYqsINxOQPJW/NOzE3FofapM/YQtxcJn+7GD
>> mZq+uyWxsfEKMG6X6wOji8yKtEumq5FuPfZ3B3iapzTqBKI93yAaR29/XK8wA+U3
>> OYW9MrPz0Ay++jU7G/CxnE57UhgIb8oKgEebaoxC7CLfxkhAltqOsnYH4trSMXQg
>> SUHMug4gIqTb2CiYPrsZzudtawhNTlFEcVbNw8OuMVwXuXuwEYq0LjZGb99638zp
>> B97JPkWdEYzHYDPnR4AQDPk7BUPK6gFE+WuRHm+3FlAyLWcQM6rrr4CiFtVlLY7p
>> 4xyyPGO/VIZWDoEVra5WtLMehLpLMD+ON/27T36X8i7sBsKhg5cR5WJ3AFhADjwd
>> iMB2RZLdAs48F+IMQKCWr1zG8sf/7xYw5pT+Ue1nBAJUzuL3W9dCO/PVG4oVXq83
>> O9OtE5d2DMIv3KEqmkulQLYbl6WtWn7U2b1eVDtGJwAI3IS1BfyKMgMa+iD9aE20
>> e1HGX9AbWMoA4t+1himO7EEeY6gbl5wAs6RyT0vYfYv1ZFTFFIMZekagvpjC3TAQ
>> 2P4aESIDUKOXwmzjqVote/h9qOe+j0BFRtP+ytlL7WabFO/hWLmLdH6MVBGMXEGD
>> HcCkW+hBThxfu+PWo0uu
>> =/Stx
>> -END PGP SIGNATURE-
>>
>>


-- 
-
Vaughn Graham
Web Lacky Third Class


unsuscribe

2016-01-22 Thread Kopilous Kopilous
Le 23 janv. 2016 07:31, "Ben Hutchings"  a écrit :

> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA512
>
> - -
> Debian Security Advisory DSA-3452-1   secur...@debian.org
> https://www.debian.org/security/Ben Hutchings
> January 23, 2016  https://www.debian.org/security/faq
> - -
>
> Package: claws-mail
> CVE ID : CVE-2015-8614
>
> "DrWhax" of the Tails project reported that Claws Mail is missing
> range checks in some text conversion functions.  A remote attacker
> could exploit this to run arbitrary code under the account of a user
> that receives a message from them using Claws Mail.
>
> For the oldstable distribution (wheezy), this problem has been fixed
> in version 3.8.1-2+deb7u1.
>
> For the stable distribution (jessie), this problem has been fixed in
> version 3.11.1-3+deb8u1.
>
> We recommend that you upgrade your claws-mail packages.
>
> Further information about Debian Security Advisories, how to apply
> these updates to your system and frequently asked questions can be
> found at: https://www.debian.org/security/
>
> Mailing list: debian-security-annou...@lists.debian.org
> -BEGIN PGP SIGNATURE-
> Version: GnuPG v1
>
> iQIcBAEBCgAGBQJWoxmeAAoJEAVMuPMTQ89EUJwP/jLpgiW3wqnjAjPJ53Ok72e9
> UWtCI53YUbWLtaTv8sHQGvRw46ZIHYqsINxOQPJW/NOzE3FofapM/YQtxcJn+7GD
> mZq+uyWxsfEKMG6X6wOji8yKtEumq5FuPfZ3B3iapzTqBKI93yAaR29/XK8wA+U3
> OYW9MrPz0Ay++jU7G/CxnE57UhgIb8oKgEebaoxC7CLfxkhAltqOsnYH4trSMXQg
> SUHMug4gIqTb2CiYPrsZzudtawhNTlFEcVbNw8OuMVwXuXuwEYq0LjZGb99638zp
> B97JPkWdEYzHYDPnR4AQDPk7BUPK6gFE+WuRHm+3FlAyLWcQM6rrr4CiFtVlLY7p
> 4xyyPGO/VIZWDoEVra5WtLMehLpLMD+ON/27T36X8i7sBsKhg5cR5WJ3AFhADjwd
> iMB2RZLdAs48F+IMQKCWr1zG8sf/7xYw5pT+Ue1nBAJUzuL3W9dCO/PVG4oVXq83
> O9OtE5d2DMIv3KEqmkulQLYbl6WtWn7U2b1eVDtGJwAI3IS1BfyKMgMa+iD9aE20
> e1HGX9AbWMoA4t+1himO7EEeY6gbl5wAs6RyT0vYfYv1ZFTFFIMZekagvpjC3TAQ
> 2P4aESIDUKOXwmzjqVote/h9qOe+j0BFRtP+ytlL7WabFO/hWLmLdH6MVBGMXEGD
> HcCkW+hBThxfu+PWo0uu
> =/Stx
> -END PGP SIGNATURE-
>
>


Unsuscribe troubles ... A 3098-1] graphviz security update

2014-12-13 Thread Migsdk86
Please unsuscribe due trouble informe my disk storage capacity

Best regiones 

Salvatore Bonaccorso  escribió:

>-BEGIN PGP SIGNED MESSAGE-
>Hash: SHA512
>
>- -
>Debian Security Advisory DSA-3098-1   secur...@debian.org
>http://www.debian.org/security/  Salvatore Bonaccorso
>December 11, 2014  http://www.debian.org/security/faq
>- -
>
>Package: graphviz
>CVE ID : CVE-2014-9157
>Debian Bug : 772648
>
>Joshua Rogers discovered a format string vulnerability in the yyerror
>function in lib/cgraph/scan.l in Graphviz, a rich set of graph drawing
>tools. An attacker could use this flaw to cause graphviz to crash or
>possibly execute arbitrary code.
>
>For the stable distribution (wheezy), this problem has been fixed in
>version 2.26.3-14+deb7u2.
>
>For the upcoming stable distribution (jessie), this problem will be
>fixed soon in version 2.38.0-7.
>
>For the unstable distribution (sid), this problem has been fixed in
>version 2.38.0-7.
>
>We recommend that you upgrade your graphviz packages.
>
>Further information about Debian Security Advisories, how to apply
>these updates to your system and frequently asked questions can be
>found at: https://www.debian.org/security/
>
>Mailing list: debian-security-annou...@lists.debian.org
>-BEGIN PGP SIGNATURE-
>Version: GnuPG v1
>
>iQIcBAEBCgAGBQJUicMWAAoJEAVMuPMTQ89EdygP/iTwBisnJ13s+afAineui04Z
>hJrj41+Wb7GQ7zkX1NZXC7e6JgD4S7GiZ0AQnoAG1dKv9yuXDc8Rk2MThP9VuSnl
>RR+sT6aTAf5rhFO342EgcTdf7H/PWz2NOVR+xHMKqd3PkwA22GmjUX9cRBeiW4Mv
>uYd6Jaq2rM5OALksebUr81zONtKbBz5jV22LtfyF4nkv+4RkzefqyJZspEbXGN2M
>ElDAkBHq3uQDeaGrzW4Xd+dlxnIJD2/KHGnCDv4YFOgX2X9dd80Txt3W51st8tgt
>TzkNPpiNUT+Izruuo772oOgQdvtCEY/reRJJw0SAP2cu2oMD/poMkbbCJ3aBlv35
>kR79MseJBigdgpzatF1MUtgpQT+Fm2T6lyszGaViEJ2rWAFBV7x7cX7nZke2vZb2
>Nrt+/w1hwnsFG0TsGCTD6k7HF+gVkva+OMhNje396dsHhtQHWQmOQfOuVRDpqRfI
>1ijvXGXomOCE9iXm/rDaEq2MsuyjB6QPaIGfD7oZun8seH0Cv+U1f7Hp7e7kn6Cf
>0uIYHG2NRSkaUrdbDWfnms6X882JFm1LHe2GdoPo64nCrOs67xwfOn+78GaYFyRN
>QBT78lyFv4SDlrwiawPKxeTFg6eAxrSXeqdJuuy4flPIUV4k613EeJ3lMMsdmrY3
>YhL3IpIOCaeow6VZDNjP
>=J1ug
>-END PGP SIGNATURE-
>
>
>-- 
>To UNSUBSCRIBE, email to debian-security-announce-requ...@lists.debian.org
>with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
>Archive: https://lists.debian.org/e1xz6z4-0002ke...@master.debian.org
>


UNSUSCRIBE

2014-07-09 Thread virgic...@hotmail.com


THX


Message du : 08/07/2014 23:34
De : "Salvatore Bonaccorso " 
A : debian-security-annou...@lists.debian.org
Copie à : 
Sujet : [SECURITY] [DSA 2974-1] php5 security update


 -BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

- -
Debian Security Advisory DSA-2974-1   secur...@debian.org
http://www.debian.org/security/  Salvatore Bonaccorso
July 08, 2014  http://www.debian.org/security/faq
- -

Package: php5
CVE ID : CVE-2014-0207 CVE-2014-3478 CVE-2014-3479 CVE-2014-3480
 CVE-2014-3487 CVE-2014-3515 CVE-2014-4721

Several vulnerabilities were found in PHP, a general-purpose scripting
language commonly used for web application development. The Common
Vulnerabilities and Exposures project identifies the following problems:

CVE-2014-0207

Francisco Alonso of the Red Hat Security Response Team reported an
incorrect boundary check in the cdf_read_short_sector() function.

CVE-2014-3478

Francisco Alonso of the Red Hat Security Response Team discovered a
flaw in the way the truncated pascal string size in the mconvert()
function is computed.

CVE-2014-3479

Francisco Alonso of the Red Hat Security Response Team reported an
incorrect boundary check in the cdf_check_stream_offset() function.

CVE-2014-3480

Francisco Alonso of the Red Hat Security Response Team reported an
insufficient boundary check in the cdf_count_chain() function.

CVE-2014-3487

Francisco Alonso of the Red Hat Security Response Team discovered an
incorrect boundary check in the cdf_read_property_info() funtion.

CVE-2014-3515

Stefan Esser discovered that the ArrayObject and the
SPLObjectStorage unserialize() handler do not verify the type of
unserialized data before using it. A remote attacker could use this
flaw to execute arbitrary code.

CVE-2014-4721

Stefan Esser discovered a type confusion issue affecting phpinfo(),
which might allow an attacker to obtain sensitive information from
process memory.

For the stable distribution (wheezy), these problems have been fixed in
version 5.4.4-14+deb7u12. In addition, this update contains several
bugfixes originally targeted for the upcoming Wheezy point release.

For the testing distribution (jessie), these problems have been fixed in
version 5.6.0~rc2+dfsg-1.

For the unstable distribution (sid), these problems have been fixed in
version 5.6.0~rc2+dfsg-1.

We recommend that you upgrade your php5 packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: http://www.debian.org/security/

Mailing list: debian-security-annou...@lists.debian.org
-BEGIN PGP SIGNATURE-
Version: GnuPG v1
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=+AZH
-END PGP SIGNATURE-


-- 
To UNSUBSCRIBE, email to debian-security-announce-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/e1x4d2d-0008tu...@master.debian.org




unsuscribe

2012-02-21 Thread Agustin Cianciulli



-Mensaje original- 
From: Nico Golde

Sent: Tuesday, February 21, 2012 7:54 PM
To: debian-security-annou...@lists.debian.org
Subject: [SECURITY] [DSA 2414-1] fex security update

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

- -
Debian Security Advisory DSA-2413-1   secur...@debian.org
http://www.debian.org/security/Nico Golde
February 21, 2012  http://www.debian.org/security/faq
- -

Package: fex
Vulnerability  : insufficient input sanitization
Problem type   : remote
Debian-specific: no
CVE ID : CVE-2012-0869

Nicola Fioravanti discovered that F*X, a web service for transferring
very large files, is not properly sanitizing input parameters of the "fup"
script.  An attacker can use this flaw to conduct reflected cross-site
scripting attacks via various script parameters.

For the stable distribution (squeeze), this problem has been fixed in
version 20100208+debian1-1+squeeze2.

For the testing distribution (wheezy), this problem will be fixed soon.

For the unstable distribution (sid), this problem has been fixed
in version 20120215-1.

We recommend that you upgrade your fex packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: http://www.debian.org/security/

Mailing list: debian-security-annou...@lists.debian.org
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.11 (GNU/Linux)

iEYEARECAAYFAk9EIJ0ACgkQHYflSXNkfP9sRwCguCPbt0Ip6mCJMnfv0HXBLmKj
HvwAnjwOhMw8QqcSWQsgVJFA8KWcyg9g
=mRCu
-END PGP SIGNATURE-


--
To UNSUBSCRIBE, email to debian-security-announce-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact 
listmas...@lists.debian.org

Archive: http://lists.debian.org/20120221225421.ga2...@ngolde.de


--
To UNSUBSCRIBE, email to debian-security-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/bay169-ds6b13aa71e7a6afd2a2c4e83...@phx.gbl



unsuscribe

2011-12-26 Thread ChHnsn

Le 26 déc. 2011 à 13:33, Moritz Muehlenhoff a écrit :

> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA1
> 
> - -
> Debian Security Advisory DSA-2374-1   secur...@debian.org
> http://www.debian.org/security/Moritz Muehlenhoff
> December 26, 2011  http://www.debian.org/security/faq
> - -
> 
> Package: openswan
> Vulnerability  : implementation error
> Problem type   : remote
> Debian-specific: no
> CVE ID : CVE-2011-4073 
> Debian Bug : 650674
> 
> The information security group at ETH Zurich discovered a denial of 
> service vulnerability in the crypto helper handler of the IKE daemon
> pluto. More information can be found in the upstream advisory at
> http://openswan.org/download/CVE-2011-4073/CVE-2011-4073.txt  
> 
> For the oldstable distribution (lenny), this problem has been fixed in
> version 1:2.4.12+dfsg-1.3+lenny4.
> 
> For the stable distribution (squeeze), this problem has been fixed in
> version 1:2.6.28+dfsg-5+squeeze1.
> 
> For the unstable distribution (sid), this problem has been fixed in
> version 1:2.6.37-1.
> 
> We recommend that you upgrade your openswan packages.
> 
> Further information about Debian Security Advisories, how to apply
> these updates to your system and frequently asked questions can be
> found at: http://www.debian.org/security/
> 
> Mailing list: debian-security-annou...@lists.debian.org
> -BEGIN PGP SIGNATURE-
> Version: GnuPG v1.4.11 (GNU/Linux)
> 
> iEYEARECAAYFAk74aSoACgkQXm3vHE4uyloTDQCgobh8B9WHUz0ayT4KJvi9C00J
> 1wYAoOdI8X4m6qEWn1cY2JKT/NERWBeJ
> =1tWK
> -END PGP SIGNATURE-
> 
> 
> -- 
> To UNSUBSCRIBE, email to debian-security-announce-requ...@lists.debian.org
> with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
> Archive: http://lists.debian.org/20111226123324.GA6951@pisco.westfalen.local
> 


--
To UNSUBSCRIBE, email to debian-security-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/c95423ac-305d-432a-bf7d-5a76bc1aa...@gmail.com



unsuscribe

2008-09-12 Thread c . eyss
Thanks!


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



UNSUSCRIBE

2008-04-13 Thread Xavier Morell



unsuscribe

2007-06-10 Thread flo hahn


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



UNSUSCRIBE

2007-06-10 Thread flo hahn


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



unsuscribe

2005-11-14 Thread lepec
unsuscribe
[EMAIL PROTECTED]


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



unsuscribe

2005-11-10 Thread Daniel Almenares
Martin Schulze wrote:
> --
> Debian Security Advisory DSA 887-1 [EMAIL PROTECTED]
> http://www.debian.org/security/ Martin Schulze
> November 7th, 2005  http://www.debian.org/security/faq
> --
>
> Package: clamav
> Vulnerability  : several
> Problem type   : remote
> Debian-specific: no
> CVE IDs: CVE-2005-3239 CVE-2005-3303 CVE-2005-3500 CVE-2005-3501
>
> Several vulnerabilities have been discovered in Clam AntiVirus, the
> antivirus scanner for Unix, designed for integration with mail servers
> to perform attachment scanning.  The Common Vulnerabilities and
> Exposures project identifies the following problems:
>
> CVE-2005-3239
>
> The OLE2 unpacker allows remote attackers to cause a segmentation
> fault via a DOC file with an invalid property tree, which triggers
> an infinite recursion.
>
> CVE-2005-3303
>
> A specially crafted executable compressed with FSG 1.33 could
> cause the extractor to write beyond buffer boundaries, allowing an
> attacker to execute arbitrary code.
>
> CVE-2005-3500
>
> A specially crafted CAB file could cause ClamAV to be locked in an
> infinite loop and use all available processor resources, resulting
> in a denial of service.
>
> CVE-2005-3501
>
> A specially crafted CAB file could cause ClamAV to be locked in an
> infinite loop and use all available processor resources, resulting
> in a denial of service.
>
> The old stable distribution (woody) does not contain clamav packages.
>
> For the stable distribution (sarge) these problems have been fixed in
> version 0.84-2.sarge.6.
>
> For the unstable distribution (sid) these problems have been fixed in
> version 0.87.1-1.
>
> We recommend that you upgrade your clamav packages.
>
>
> Upgrade Instructions
> 
>
> wget url
> will fetch the file for you
> dpkg -i file.deb
> will install the referenced file.
>
> If you are using the apt-get package manager, use the line for
> sources.list as given below:
>
> apt-get update
> will update the internal database
> apt-get upgrade
> will install corrected packages
>
> You may use an automated update by adding the resources from the
> footer to the proper configuration.
>
>
> Debian GNU/Linux 3.1 alias sarge
> 
>
>   Source archives:
>
>
> http://security.debian.org/pool/updates/main/c/clamav/clamav_0.84-2.sarge.6.dsc
>   Size/MD5 checksum:  872 dbecf7f7f16f69bdbad77a24106f7779
>
> http://security.debian.org/pool/updates/main/c/clamav/clamav_0.84-2.sarge.6.diff.gz
>   Size/MD5 checksum:   177500 64ba2a8ad84cc961a564eaac4d65a642
>
> http://security.debian.org/pool/updates/main/c/clamav/clamav_0.84.orig.tar.gz
>   Size/MD5 checksum:  4006624 c43213da01d510faf117daa9a4d5326c
>
>   Architecture independent components:
>
>
> http://security.debian.org/pool/updates/main/c/clamav/clamav-base_0.84-2.sarge.6_all.deb
>   Size/MD5 checksum:   154598 3a979fedbb1102fbe4c710621513ec4f
>
> http://security.debian.org/pool/updates/main/c/clamav/clamav-docs_0.84-2.sarge.6_all.deb
>   Size/MD5 checksum:   690218 4143f2f7719c3a359e9c2c7079a9674f
>
> http://security.debian.org/pool/updates/main/c/clamav/clamav-testfiles_0.84-2.sarge.6_all.deb
>   Size/MD5 checksum:   123568 2ac5e526c3063a704f68233a56b1d9a3
>
>   Alpha architecture:
>
>
> http://security.debian.org/pool/updates/main/c/clamav/clamav_0.84-2.sarge.6_alpha.deb
>   Size/MD5 checksum:74682 a8a3aa80c3030c5541d5444f7dfb5e39
>
> http://security.debian.org/pool/updates/main/c/clamav/clamav-daemon_0.84-2.sarge.6_alpha.deb
>   Size/MD5 checksum:48774 64a2bfb8d0578085b4e64853a2c4686f
>
> http://security.debian.org/pool/updates/main/c/clamav/clamav-freshclam_0.84-2.sarge.6_alpha.deb
>   Size/MD5 checksum:  2176366 88cce725133f000ca90f2db1cf05561f
>
> http://security.debian.org/pool/updates/main/c/clamav/clamav-milter_0.84-2.sarge.6_alpha.deb
>   Size/MD5 checksum:42114 b8c7c0ca88544cdaaba1b8a397cd8d83
>
> http://security.debian.org/pool/updates/main/c/clamav/libclamav-dev_0.84-2.sarge.6_alpha.deb
>   Size/MD5 checksum:   255164 b245e6b7b72e215738a9ebabd5bf81f2
>
> http://security.debian.org/pool/updates/main/c/clamav/libclamav1_0.84-2.sarge.6_alpha.deb
>   Size/MD5 checksum:   284690 377a0ba8c870ab5bfab6fe41cf8fb123
>
>   AMD64 architecture:
>
>
> http://security.debian.org/pool/updates/main/c/clamav/clamav_0.84-2.sarge.6_amd64.deb
>   Size/MD5 checksum:68874 f5d18144c18d86fbf2151d365e55da1c
>
> http://security.debian.org/pool/updates/main/c/clamav/clamav-daemon_0.84-2.sarge.6_amd64.deb
>   Size/MD5 checksum:44190 58d96c1544570a9e54be0d24a66f8aa5
>
> http://security

READ the footer at the bottom of every message (was Re: !!!! UNSUSCRIBE !!!!)

2005-09-30 Thread Edward J. Shornock

1) Spell it properly
2) Read the email footer:

To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact 
[EMAIL PROTECTED]


3) Don't reply to all on mailing lists, especially with an unsubscribe 
request



--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



!!!! UNSUSCRIBE !!!!

2005-09-30 Thread Benjamin Maerte

Vincent Caron a écrit :


On Fri, 2005-09-30 at 08:49 +0200, Martin Schulze wrote:
 


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

- --
Debian Security Advisory DSA 829-1 [EMAIL PROTECTED]
http://www.debian.org/security/ Martin Schulze
September 30, 2005  http://www.debian.org/security/faq
- --

Package: mysql
Vulnerability  : buffer overflow
Problem type   : remote
Debian-specific: no
CVE ID : CAN-2005-2558
BugTraq ID : 14509

A stack-based buffer overflow in the init_syms function of MySQL, a
popular database, has been discovered that allows remote authenticated
users who can create user-defined functions to execute arbitrary code
via a long function_name field.  The ability to create user-defined
functions is not typically granted to untrusted users.

The following vulnerability matrix shows which version of MySQL in
which distribution has this problem fixed:

woody  sarge  sid
mysql 3.23.49-8.14   n/a   n/a
mysql-dfsgn/a  4.0.24-10sarge14.0.24-10sarge1
mysql-dfsg-4.1n/a  4.1.11a-4sarge24.1.14-2
mysql-dfsg-5.0n/an/a5.0.11beta-3
   



 That's not one of our package, I've checked.



 




--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



unsuscribe

2005-06-28 Thread Axel Renault




--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



unsuscribe

2005-03-15 Thread Diego Labonia

>-- Mensaje Original --
>Date: Mon, 14 Mar 2005 17:22:59 +0100 (CET)
>To: debian-security-announce@lists.debian.org (Debian Security Announcements)
>From: [EMAIL PROTECTED] (Martin Schulze)
>Subject: [SECURITY] [DSA 693-1] New luxman packages fix local root exploit
>Reply-To: debian-security@lists.debian.org
>
>
>-BEGIN PGP SIGNED MESSAGE-
>Hash: SHA1
>
>- --
>Debian Security Advisory DSA 693-1 [EMAIL PROTECTED]
>http://www.debian.org/security/ Martin Schulze
>March 14, 2005  http://www.debian.org/security/faq
>- --
>
>Package: luxman
>Vulnerability  : buffer overflow
>Problem-Type   : local
>Debian-specific: no
>CVE ID : CAN-2005-0385
>
>Kevin Finisterre discovered a buffer overflow in luxman, an SVGA based
>PacMan clone, that could lead to the execution of arbitrary commands
>as root.
>
>For the stable distribution (woody) this problem has been fixed in
>version 0.41-17.2.
>
>For the unstable distribution (sid) this problem has been fixed in
>version 0.41-20.
>
>We recommend that you upgrade your luxman package.
>
>
>Upgrade Instructions
>- 
>
>wget url
>will fetch the file for you
>dpkg -i file.deb
>will install the referenced file.
>
>If you are using the apt-get package manager, use the line for
>sources.list as given below:
>
>apt-get update
>will update the internal database
>apt-get upgrade
>will install corrected packages
>
>You may use an automated update by adding the resources from the
>footer to the proper configuration.
>
>
>Debian GNU/Linux 3.0 alias woody
>- 
>
>  Source archives:
>
>http://security.debian.org/pool/updates/main/l/luxman/luxman_0.41-17.2.dsc
>  Size/MD5 checksum:  570 a55086f936bbcfe22598ac0aeb94f8da
>
> http://security.debian.org/pool/updates/main/l/luxman/luxman_0.41-17.2.diff.gz
>  Size/MD5 checksum: 7105 8719173e012bab5680d138d25e30b619
>
> http://security.debian.org/pool/updates/main/l/luxman/luxman_0.41.orig.tar.gz
>  Size/MD5 checksum:   268279 aa389327578e2d65f3f5035193e407cb
>
>  Intel IA-32 architecture:
>
>
> http://security.debian.org/pool/updates/main/l/luxman/luxman_0.41-17.2_i386.deb
>  Size/MD5 checksum:   290762 c4123222e992a37dcf609768a20e7e8f
>
>
>  These files will probably be moved into the stable distribution on
>  its next update.
>
>- 
>-
>For apt-get: deb http://security.debian.org/ stable/updates main
>For dpkg-ftp: ftp://security.debian.org/debian-security 
>dists/stable/updates/main
>Mailing list: debian-security-announce@lists.debian.org
>Package info: `apt-cache show ' and http://packages.debian.org/
>
>-BEGIN PGP SIGNATURE-
>Version: GnuPG v1.4.0 (GNU/Linux)
>
>iD8DBQFCNbpiW5ql+IAeqTIRAhtSAJ0d3a6I8wMPZUxKMaOGXtd5oZ7MJgCeI3NF
>FIFFNlRq/R/T9Qs2asyHLSo=
>=NXet
>-END PGP SIGNATURE-
>
>
>-- 
>To UNSUBSCRIBE, email to [EMAIL PROTECTED]
>with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
>


__

Obtenga gratis su cuenta @Argentina.com con AntiVirus, 20mb de espacio, 
acceso POP3 y SMTP en 24 ciudades www.Argentina.com



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



unsuscribe

2005-01-19 Thread Aurelien Roux
Le Tue, Jan 18, 2005 at 10:41:00AM +0100, Martin Schulze a écrit :
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA1
> 
> - --
> Debian Security Advisory DSA 644-1 [EMAIL PROTECTED]
> http://www.debian.org/security/ Martin Schulze
> January 18th, 2005  http://www.debian.org/security/faq
> - --
> 
> Package: chbg
> Vulnerability  : buffer overflow
> Problem-Type   : local
> Debian-specific: no
> CVE ID : CAN-2004-1264
> Debian Bug : 285904
> 
> Danny Lungstrom discoverd a vulnerability in chbg, a tool to change
> background pictures.  A maliciously crafted configuration/scenario
> file could overflow a buffer and lead to the execution of arbitrary
> code on the victim's machine.
> 
> For the stable distribution (woody) this problem has been fixed in
> version 1.5-1woody1.
> 
> For the unstable distribution (sid) this problem has been fixed in
> version 1.5-4.
> 
> We recommend that you upgrade your chbg package.
> 
> 
> Upgrade Instructions
> - 
> 
> wget url
> will fetch the file for you
> dpkg -i file.deb
> will install the referenced file.
> 
> If you are using the apt-get package manager, use the line for
> sources.list as given below:
> 
> apt-get update
> will update the internal database
> apt-get upgrade
> will install corrected packages
> 
> You may use an automated update by adding the resources from the
> footer to the proper configuration.
> 
> 
> Debian GNU/Linux 3.0 alias woody
> - 
> 
>   Source archives:
> 
> http://security.debian.org/pool/updates/main/c/chbg/chbg_1.5-1woody1.dsc
>   Size/MD5 checksum:  600 3cb28b61fb97dca63f09a486dae5612f
> 
> http://security.debian.org/pool/updates/main/c/chbg/chbg_1.5-1woody1.diff.gz
>   Size/MD5 checksum: 3612 08098cf0fec406380e968186766de027
> http://security.debian.org/pool/updates/main/c/chbg/chbg_1.5.orig.tar.gz
>   Size/MD5 checksum:   322878 4a158c94c25b359c86da1de9ef3e986b
> 
>   Alpha architecture:
> 
> 
> http://security.debian.org/pool/updates/main/c/chbg/chbg_1.5-1woody1_alpha.deb
>   Size/MD5 checksum:   294456 afd6ce377d43c0df909d955e04c328cd
> 
>   ARM architecture:
> 
> 
> http://security.debian.org/pool/updates/main/c/chbg/chbg_1.5-1woody1_arm.deb
>   Size/MD5 checksum:   247338 878c528ab81decd999503ad47557fc4a
> 
>   Intel IA-32 architecture:
> 
> 
> http://security.debian.org/pool/updates/main/c/chbg/chbg_1.5-1woody1_i386.deb
>   Size/MD5 checksum:   244862 d3a09b86dfc44164c541cda2eb66ce66
> 
>   Intel IA-64 architecture:
> 
> 
> http://security.debian.org/pool/updates/main/c/chbg/chbg_1.5-1woody1_ia64.deb
>   Size/MD5 checksum:   345228 e4b9ae6b9da9c34d5a930727bdfc1a44
> 
>   HP Precision architecture:
> 
> Cannot be updated due to compiler error.
> 
>   Motorola 680x0 architecture:
> 
> 
> http://security.debian.org/pool/updates/main/c/chbg/chbg_1.5-1woody1_m68k.deb
>   Size/MD5 checksum:   222916 7dce4c0b3ae27f624ee472bd153d5c66
> 
>   Big endian MIPS architecture:
> 
> 
> http://security.debian.org/pool/updates/main/c/chbg/chbg_1.5-1woody1_mips.deb
>   Size/MD5 checksum:   249054 66402b53b158bfa0b2144b6b97b1d794
> 
>   Little endian MIPS architecture:
> 
> 
> http://security.debian.org/pool/updates/main/c/chbg/chbg_1.5-1woody1_mipsel.deb
>   Size/MD5 checksum:   247536 769f5074ad1f4b148191d0e196d01778
> 
>   PowerPC architecture:
> 
> 
> http://security.debian.org/pool/updates/main/c/chbg/chbg_1.5-1woody1_powerpc.deb
>   Size/MD5 checksum:   271272 f6b03b2a05de42ee203d7d9cbfe7c468
> 
>   IBM S/390 architecture:
> 
> 
> http://security.debian.org/pool/updates/main/c/chbg/chbg_1.5-1woody1_s390.deb
>   Size/MD5 checksum:   239098 f20c7b0e36ecfc4540d3673f4ec477dd
> 
>   Sun Sparc architecture:
> 
> 
> http://security.debian.org/pool/updates/main/c/chbg/chbg_1.5-1woody1_sparc.deb
>   Size/MD5 checksum:   263302 28df5318e314bbaf79493b485aa6cffa
> 
> 
>   These files will probably be moved into the stable distribution on
>   its next update.
> 
> - 
> -
> For apt-get: deb http://security.debian.org/ stable/updates main
> For dpkg-ftp: ftp://security.debian.org/debian-security 
> dists/stable/updates/main
> Mailing list: debian-security-announce@lists.debian.org
> Package info: `apt-cache show ' and http://packages.debian.org/
> 
> -BEGIN PGP SIGNATURE-
> Version: GnuPG v1.2.5 (GNU/Linux)
> 
> iD8DBQFB7NmrW5ql+IAeqTIRAmUEAKCLSpd0/8eiiFhfymdRCV70pS6p9QCfUIfW
> JmmWy3Pi87ZjfreLomQQIls=
> =WpPd
> -END PGP SIGNATURE-
> 
> 
> -- 
> To UNSUBSCRIBE, email to [EMAIL PROTECTED]
> with a subject of "unsubscribe". Trouble? Contact [

unsuscribe

2003-12-17 Thread Raul

unsuscribe



unsuscribe

2003-12-17 Thread Raul
unsuscribe

--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]


unsuscribe

2003-02-03 Thread Mariana . Bence


-Mensaje original-
De: Mike Barushok [mailto:[EMAIL PROTECTED]
Enviado el: Lunes 3 de Febrero de 2003 04:15
Para: Stefaan Teerlinck
Cc: debian-security@lists.debian.org
Asunto: Re: formmail.pl



Correction on my earlier reply, to find the location of all the
formmail files, use:
  find /home/ -name formmail*

(If all your sites are under /home/ )

On Mon, 3 Feb 2003, Stefaan Teerlinck wrote:

> Hi,
> 
> I have a server with a lot of name-based virtual hosts. On one of those
> sites the formmail.pl script is being abused, a client is using an
> unsecure script. How can I find out on what site this is?
> 
> Thanks,
> Stefaan.
> 
> 


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact
[EMAIL PROTECTED]



unsuscribe

2003-02-03 Thread Mariana . Bence


-Mensaje original-
De: Mike Barushok [mailto:[EMAIL PROTECTED]]
Enviado el: Lunes 3 de Febrero de 2003 04:15
Para: Stefaan Teerlinck
Cc: [EMAIL PROTECTED]
Asunto: Re: formmail.pl



Correction on my earlier reply, to find the location of all the
formmail files, use:
  find /home/ -name formmail*

(If all your sites are under /home/ )

On Mon, 3 Feb 2003, Stefaan Teerlinck wrote:

> Hi,
> 
> I have a server with a lot of name-based virtual hosts. On one of those
> sites the formmail.pl script is being abused, a client is using an
> unsecure script. How can I find out on what site this is?
> 
> Thanks,
> Stefaan.
> 
> 


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact
[EMAIL PROTECTED]


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]




Re: Unsuscribe

2002-11-11 Thread belg
Lovley! :P

On Mon, 11 Nov 2002, Gelokatil Registred Trademark wrote:

>
>
>
>
>
> 
> ?nete al mayor servicio mundial de correo electr?nico: Haz clic aqu? --
> To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a
> subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
>



Re: Unsuscribe

2002-11-11 Thread belg
Lovley! :P

On Mon, 11 Nov 2002, Gelokatil Registred Trademark wrote:

>
>
>
>
>
> 
> Únete al mayor servicio mundial de correo electrónico: Haz clic aquí --
> To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a
> subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
>


--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]




Unsuscribe

2002-11-11 Thread Gelokatil Registred Trademark

 Únete al mayor servicio mundial de correo electrónico: Haz clic aquí 



Unsuscribe

2002-11-11 Thread Gelokatil Registred Trademark

 Únete al mayor servicio mundial de correo electrónico: Haz clic aquí 


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



unsuscribe

2002-10-28 Thread Sancho Lerena Urrea
unsuscribe
-- 
__
Sign-up for your own FREE Personalized E-mail at Mail.com
http://www.mail.com/?sr=signup



unsuscribe

2002-10-28 Thread Sancho Lerena Urrea
unsuscribe
-- 
__
Sign-up for your own FREE Personalized E-mail at Mail.com
http://www.mail.com/?sr=signup


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]




unsuscribe

2001-04-13 Thread graciela . lopez
 



unsuscribe

2001-04-13 Thread graciela . lopez

 


--  
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]