/*
source: wwwsecurityfocuscom/bid/6094/info
Vulnerabilities have been discovered in two files used by Abuse
By passing an execessively long commandline argument to Abuse, it is possible to overrun a buffer Exploiting this issue could allow a local attacker to overwrite sensitive memory variables, resulting in the execution of arbitrar ...