"Geo." <georger{at}nls.net>">mailto:georger{at}nls.net">georger{at}nls.net>
wrote=20
in message news:3e2762a0{at}w3.nls.net...
"Randy H" <mailto:randy_holcomb{at}attglobal.net">
size=3D2>randy_holcomb{at}attglobal.net> =
wrote in=20
message news:3e2756fa{at}w3.nls.net...
> What I'd like to know is how many new =
vulnerability=20
vectors these> new features have
added.
=20
http://online.securityfocus.com/sfonline/images/build/bllt_rd_1.gi=
f"=20
border=3D0>
2002-10-18:
Windows">http://online.securityfocus.com/bid/6003">Windows =
Media=20
Player For Solaris Default World Writeable Permissions=20
Vulnerability
http://online.securityfocus.com/sfonline/images/build/bllt_rd_1.gi=
f"=20
border=3D0>
| 2002-08-22:
Microsoft">http://online.securityfocus.com/bid/5543">Microsoft Windows=20
Media Player File Attachment Script Execution=20
Vulnerability
http://online.securityfocus.com/sfonline/images/build/bllt_rd_1.gi=
f"=20
border=3D0>
| 2002-07-30:
Microsoft">http://online.securityfocus.com/bid/5357">Microsoft Windows=20
Media Player Filename Buffer Overflow =
Vulnerability
http://online.securityfocus.com/sfonline/images/build/bllt_rd_1.gi=
f"=20
border=3D0>
| 2002-07-25:
Windows">http://online.securityfocus.com/bid/5107">Windows =
Media=20
Player IE Cache Path Disclosure =
Vulnerability
http://online.securityfocus.com/sfonline/images/build/bllt_rd_1.gi=
f"=20
border=3D0>
| 2002-06-27:
Windows">http://online.securityfocus.com/bid/5110">Windows =
Media=20
Player Playlist HTML Script Execution =
Vulnerability
http://online.securityfocus.com/sfonline/images/build/bllt_rd_1.gi=
f"=20
border=3D0>
| 2002-06-27:
Windows">http://online.securityfocus.com/bid/5109">Windows =
Media=20
Player WMDM Privilege Escalation =
Vulnerability
http://online.securityfocus.com/sfonline/images/build/bllt_rd_1.gi=
f"=20
border=3D0>
| 2001-11-20:
Windows">http://online.securityfocus.com/bid/2765">Windows =
Media=20
Player Internet Shortcut Execution =
Vulnerability
http://online.securityfocus.com/sfonline/images/build/bllt_rd_1.gi=
f"=20
border=3D0>
| 2001-11-20:
Microsoft">http://online.securityfocus.com/bid/3105">Microsoft Windows=20
Media Player .NSC File Buffer Overflow =
Vulnerability
http://online.securityfocus.com/sfonline/images/build/bllt_rd_1.gi=
f"=20
border=3D0>
| 2001-11-20:
Microsoft">http://online.securityfocus.com/bid/3156">Microsoft Windows=20
Media Player .ASF Marker Buffer Overflow =
Vulnerability
http://online.securityfocus.com/sfonline/images/build/bllt_rd_1.gi=
f"=20
border=3D0>
| 2001-08-13:
Windows">http://online.securityfocus.com/bid/2686">Windows =
Media=20
Player .ASX 'Version' Buffer Overflow =
Vulnerability
http://online.securityfocus.com/sfonline/images/build/bllt_rd_1.gi=
f"=20
border=3D0>
| 2001-05-26:
Microsoft">http://online.securityfocus.com/bid/1980">Microsoft Windows=20
Media Player .ASX Buffer Overflow =
Vulnerability
http://online.securityfocus.com/sfonline/images/build/bllt_rd_1.gi=
f"=20
border=3D0>
| 2001-05-02:
Windows">http://online.securityfocus.com/bid/2677">Windows =
Media=20
Player .ASX Buffer Overflow
Vulnerability
http://online.securityfocus.com/sfonline/images/build/bllt_rd_1.gi=
f"=20
border=3D0>
| 2001-02-14:
Microsoft">http://online.securityfocus.com/bid/2203">Microsoft Windows=20
Media Player .WMZ Arbitrary Java Applet =
Vulnerability
http://online.securityfocus.com/sfonline/images/build/bllt_rd_1.gi=
f"=20
border=3D0>
| 2001-01-01:
Microsoft">http://online.securityfocus.com/bid/2167">Microsoft Windows=20
Media Player Javascript URL
Vulnerability
http://online.securityfocus.com/sfonline/images/build/bllt_rd_1.gi=
f"=20
border=3D0>
| 2000-11-22:
Microsoft">http://online.securityfocus.com/bid/1976">Microsoft Windows=20
Media Player .WMS Arbitrary Script =
Vulnerability
http://online.securityfocus.com/sfonline/images/build/bllt_rd_1.gi=
f"=20
border=3D0>
| 2000-09-26:
Microsoft">http://online.securityfocus.com/bid/1714">Microsoft Windows=20
Media Player 7 Embedded OCX Control=20
=
Vulnerability
|
------=_NextPart_001_0024_01C2BD9E.0CB29DB0--
------=_NextPart_000_0023_01C2BD9E.0CB29DB0
Content-Type: image/gif;
name="bllt_rd_1.gif"
Content-Transfer-Encoding: base64
Content-Location: http://online.securityfocus.com/sfonline/images/build/bllt_rd
_1.gif
R0lGODlhBQAKAIAAAMDAwJYAGCH5BAEAAAAALAAAAAAFAAoAQAILhG8RyKC+2nlPqgIAOw==
------=_NextPart_000_0023_01C2BD9E.0CB29DB0--
--- BBBS/NT v4.01 Flag-4
* Origin: Barktopia BBS Site http://HarborWebs.com:8081 (1:379/1.45)
SEEN-BY: 633/267 270
@PATH: 379/1 633/267
|