"Geo." <georger{at}nls.net>=20">mailto:georger{at}nls.net">georger{at}nls.net>=20
wrote in message news:3e2762a0{at}w3.nls.net...
"Randy H" <mailto:randy_holcomb{at}attglobal.net">
size=3D2>randy_holcomb{at}attglobal.net> =
wrote in=20
message news:3e2756fa{at}w3.nls.net...
> What I'd like to know is how many new =
vulnerability=20
vectors these> new features have
added.
=20
http://online.securityfocus.com/sfonline/images/build/bllt_rd_1.gi=
f"=20
border=3D0>
2002-10-18:
Windows">http://online.securityfocus.com/bid/6003">Windows Media=20
Player For Solaris Default World Writeable Permissions=20
Vulnerability
http://online.securityfocus.com/sfonline/images/build/bllt_rd_1.gi=
f"=20
border=3D0>
| 2002-08-22:
Microsoft=20">http://online.securityfocus.com/bid/5543">Microsoft=20
Windows Media Player File Attachment Script Execution=20
Vulnerability
http://online.securityfocus.com/sfonline/images/build/bllt_rd_1.gi=
f"=20
border=3D0>
| 2002-07-30:
Microsoft=20">http://online.securityfocus.com/bid/5357">Microsoft=20
Windows Media Player Filename Buffer Overflow=20
Vulnerability
http://online.securityfocus.com/sfonline/images/build/bllt_rd_1.gi=
f"=20
border=3D0>
| 2002-07-25:
Windows">http://online.securityfocus.com/bid/5107">Windows Media=20
Player IE Cache Path Disclosure =
Vulnerability
http://online.securityfocus.com/sfonline/images/build/bllt_rd_1.gi=
f"=20
border=3D0>
| 2002-06-27:
Windows">http://online.securityfocus.com/bid/5110">Windows Media=20
Player Playlist HTML Script Execution =
Vulnerability
http://online.securityfocus.com/sfonline/images/build/bllt_rd_1.gi=
f"=20
border=3D0>
| 2002-06-27:
Windows">http://online.securityfocus.com/bid/5109">Windows Media=20
Player WMDM Privilege Escalation =
Vulnerability
http://online.securityfocus.com/sfonline/images/build/bllt_rd_1.gi=
f"=20
border=3D0>
| 2001-11-20:
Windows">http://online.securityfocus.com/bid/2765">Windows Media=20
Player Internet Shortcut Execution =
Vulnerability
http://online.securityfocus.com/sfonline/images/build/bllt_rd_1.gi=
f"=20
border=3D0>
| 2001-11-20:
Microsoft=20">http://online.securityfocus.com/bid/3105">Microsoft=20
Windows Media Player .NSC File Buffer Overflow=20
Vulnerability
http://online.securityfocus.com/sfonline/images/build/bllt_rd_1.gi=
f"=20
border=3D0>
| 2001-11-20:
Microsoft=20">http://online.securityfocus.com/bid/3156">Microsoft=20
Windows Media Player .ASF Marker Buffer Overflow=20
Vulnerability
http://online.securityfocus.com/sfonline/images/build/bllt_rd_1.gi=
f"=20
border=3D0>
| 2001-08-13:
Windows">http://online.securityfocus.com/bid/2686">Windows Media=20
Player .ASX 'Version' Buffer Overflow =
Vulnerability
http://online.securityfocus.com/sfonline/images/build/bllt_rd_1.gi=
f"=20
border=3D0>
| 2001-05-26:
Microsoft=20">http://online.securityfocus.com/bid/1980">Microsoft=20
Windows Media Player .ASX Buffer Overflow=20
Vulnerability
http://online.securityfocus.com/sfonline/images/build/bllt_rd_1.gi=
f"=20
border=3D0>
| 2001-05-02:
Windows">http://online.securityfocus.com/bid/2677">Windows Media=20
Player .ASX Buffer Overflow
Vulnerability
http://online.securityfocus.com/sfonline/images/build/bllt_rd_1.gi=
f"=20
border=3D0>
| 2001-02-14:
Microsoft=20">http://online.securityfocus.com/bid/2203">Microsoft=20
Windows Media Player .WMZ Arbitrary Java Applet=20
Vulnerability
http://online.securityfocus.com/sfonline/images/build/bllt_rd_1.gi=
f"=20
border=3D0>
| 2001-01-01:
Microsoft=20">http://online.securityfocus.com/bid/2167">Microsoft=20
Windows Media Player Javascript URL =
Vulnerability
http://online.securityfocus.com/sfonline/images/build/bllt_rd_1.gi=
f"=20
border=3D0>
| 2000-11-22:
Microsoft=20">http://online.securityfocus.com/bid/1976">Microsoft=20
Windows Media Player .WMS Arbitrary Script=20
Vulnerability
http://online.securityfocus.com/sfonline/images/build/bllt_rd_1.gi=
f"=20
border=3D0>
| 2000-09-26:
Microsoft=20">http://online.securityfocus.com/bid/1714">Microsoft=20
Windows Media Player 7 Embedded OCX Control=20
=
Vulnerability
| <=
/HTML>
------=_NextPart_001_017E_01C2BDAC.A96D4390--
------=_NextPart_000_017D_01C2BDAC.A96D4390
Content-Type: image/gif;
name="bllt_rd_1.gif"
Content-Transfer-Encoding: base64
Content-Location: http://online.securityfocus.com/sfonline/images/build/bllt_rd
_1.gif
R0lGODlhBQAKAIAAAMDAwJYAGCH5BAEAAAAALAAAAAAFAAoAQAILhG8RyKC+2nlPqgIAOw==
------=_NextPart_000_017D_01C2BDAC.A96D4390--
--- BBBS/NT v4.01 Flag-4
* Origin: Barktopia BBS Site http://HarborWebs.com:8081 (1:379/1.45)
SEEN-BY: 633/267 270
@PATH: 379/1 633/267
|