TIP: Click on subject to list as thread! ANSI
echo: nthelp
to: Randy H
from: Geo.
date: 2003-01-16 20:49:34
subject: Re: What is efficient?

From: "Geo." 

This is a multi-part message in MIME format.

------=_NextPart_000_003E_01C2BDA0.C78A45A0
Content-Type: multipart/alternative;
        boundary="----=_NextPart_001_003F_01C2BDA0.C78A45A0"


------=_NextPart_001_003F_01C2BDA0.C78A45A0
Content-Type: text/plain;
        charset="Windows-1252"
Content-Transfer-Encoding: quoted-printable

"Randy H"  wrote in message =
news:3e2756fa{at}w3.nls.net...
> What I'd like to know is how many new vulnerability vectors these
> new features have added.

   2002-10-18:  Windows Media Player For Solaris Default World Writeable =
Permissions Vulnerability=20
            2002-08-22:  Microsoft Windows Media Player File Attachment =
Script Execution Vulnerability=20
            2002-07-30:  Microsoft Windows Media Player Filename Buffer =
Overflow Vulnerability=20
            2002-07-25:  Windows Media Player IE Cache Path Disclosure =
Vulnerability=20
            2002-06-27:  Windows Media Player Playlist HTML Script =
Execution Vulnerability=20
            2002-06-27:  Windows Media Player WMDM Privilege Escalation =
Vulnerability=20
            2001-11-20:  Windows Media Player Internet Shortcut =
Execution Vulnerability=20
            2001-11-20:  Microsoft Windows Media Player .NSC File Buffer =
Overflow Vulnerability=20
            2001-11-20:  Microsoft Windows Media Player .ASF Marker =
Buffer Overflow Vulnerability=20
            2001-08-13:  Windows Media Player .ASX 'Version' Buffer =
Overflow Vulnerability=20
            2001-05-26:  Microsoft Windows Media Player .ASX Buffer =
Overflow Vulnerability=20
            2001-05-02:  Windows Media Player .ASX Buffer Overflow =
Vulnerability=20
            2001-02-14:  Microsoft Windows Media Player .WMZ Arbitrary =
Java Applet Vulnerability=20
            2001-01-01:  Microsoft Windows Media Player Javascript URL =
Vulnerability=20
            2000-11-22:  Microsoft Windows Media Player .WMS Arbitrary =
Script Vulnerability=20
            2000-09-26:  Microsoft Windows Media Player 7 Embedded OCX =
Control Vulnerability=20
    =20

    =20

------=_NextPart_001_003F_01C2BDA0.C78A45A0
Content-Type: text/html;
        charset="Windows-1252"
Content-Transfer-Encoding: quoted-printable








"Randy H" <mailto:randy_holcomb{at}attglobal.net">
size=3D2>randy_holcomb{at}attglobal.net> wrote = in message=20
news:3e2756fa{at}w3.nls.net...
> What I'd like to know is how many new =
vulnerability=20
vectors these> new features have
added.
 

  
  
    
      
        
        
          3D""=20http://online.securityfocus.com/sfonline/images/build/bllt_rd_1.gi=
f"=20
            border=3D0>
          
2002-10-18: Windows">http://online.securityfocus.com/bid/6003">Windows = Media Player=20 For Solaris Default World Writeable Permissions=20 Vulnerability 3D""=20http://online.securityfocus.com/sfonline/images/build/bllt_rd_1.gi= f"=20 border=3D0> 2002-08-22: Microsoft">http://online.securityfocus.com/bid/5543">Microsoft = Windows=20 Media Player File Attachment Script Execution=20 Vulnerability 3D""=20http://online.securityfocus.com/sfonline/images/build/bllt_rd_1.gi= f"=20 border=3D0> 2002-07-30: Microsoft">http://online.securityfocus.com/bid/5357">Microsoft = Windows=20 Media Player Filename Buffer Overflow = Vulnerability 3D""=20http://online.securityfocus.com/sfonline/images/build/bllt_rd_1.gi= f"=20 border=3D0> 2002-07-25: Windows">http://online.securityfocus.com/bid/5107">Windows = Media Player=20 IE Cache Path Disclosure Vulnerability 3D""=20http://online.securityfocus.com/sfonline/images/build/bllt_rd_1.gi= f"=20 border=3D0> 2002-06-27: Windows">http://online.securityfocus.com/bid/5110">Windows = Media Player=20 Playlist HTML Script Execution Vulnerability 3D""=20http://online.securityfocus.com/sfonline/images/build/bllt_rd_1.gi= f"=20 border=3D0> 2002-06-27: Windows">http://online.securityfocus.com/bid/5109">Windows = Media Player=20 WMDM Privilege Escalation Vulnerability 3D""=20http://online.securityfocus.com/sfonline/images/build/bllt_rd_1.gi= f"=20 border=3D0> 2001-11-20: Windows">http://online.securityfocus.com/bid/2765">Windows = Media Player=20 Internet Shortcut Execution Vulnerability 3D""=20http://online.securityfocus.com/sfonline/images/build/bllt_rd_1.gi= f"=20 border=3D0> 2001-11-20: Microsoft">http://online.securityfocus.com/bid/3105">Microsoft = Windows=20 Media Player .NSC File Buffer Overflow = Vulnerability 3D""=20http://online.securityfocus.com/sfonline/images/build/bllt_rd_1.gi= f"=20 border=3D0> 2001-11-20: Microsoft">http://online.securityfocus.com/bid/3156">Microsoft = Windows=20 Media Player .ASF Marker Buffer Overflow = Vulnerability 3D""=20http://online.securityfocus.com/sfonline/images/build/bllt_rd_1.gi= f"=20 border=3D0> 2001-08-13: Windows">http://online.securityfocus.com/bid/2686">Windows = Media Player=20 .ASX 'Version' Buffer Overflow Vulnerability 3D""=20http://online.securityfocus.com/sfonline/images/build/bllt_rd_1.gi= f"=20 border=3D0> 2001-05-26: Microsoft">http://online.securityfocus.com/bid/1980">Microsoft = Windows=20 Media Player .ASX Buffer Overflow = Vulnerability 3D""=20http://online.securityfocus.com/sfonline/images/build/bllt_rd_1.gi= f"=20 border=3D0> 2001-05-02: Windows">http://online.securityfocus.com/bid/2677">Windows = Media Player=20 .ASX Buffer Overflow Vulnerability 3D""=20http://online.securityfocus.com/sfonline/images/build/bllt_rd_1.gi= f"=20 border=3D0> 2001-02-14: Microsoft">http://online.securityfocus.com/bid/2203">Microsoft = Windows=20 Media Player .WMZ Arbitrary Java Applet = Vulnerability 3D""=20http://online.securityfocus.com/sfonline/images/build/bllt_rd_1.gi= f"=20 border=3D0> 2001-01-01: Microsoft">http://online.securityfocus.com/bid/2167">Microsoft = Windows=20 Media Player Javascript URL Vulnerability 3D""=20http://online.securityfocus.com/sfonline/images/build/bllt_rd_1.gi= f"=20 border=3D0> 2000-11-22: Microsoft">http://online.securityfocus.com/bid/1976">Microsoft = Windows=20 Media Player .WMS Arbitrary Script = Vulnerability 3D""=20http://online.securityfocus.com/sfonline/images/build/bllt_rd_1.gi= f"=20 border=3D0> 2000-09-26: Microsoft">http://online.securityfocus.com/bid/1714">Microsoft = Windows=20 Media Player 7 Embedded OCX Control=20 = Vulnerability ------=_NextPart_001_003F_01C2BDA0.C78A45A0-- ------=_NextPart_000_003E_01C2BDA0.C78A45A0 Content-Type: image/gif; name="bllt_rd_1.gif" Content-Transfer-Encoding: base64 Content-Location: http://online.securityfocus.com/sfonline/images/build/bllt_rd _1.gif R0lGODlhBQAKAIAAAMDAwJYAGCH5BAEAAAAALAAAAAAFAAoAQAILhG8RyKC+2nlPqgIAOw== ------=_NextPart_000_003E_01C2BDA0.C78A45A0-- --- BBBS/NT v4.01 Flag-4 * Origin: Barktopia BBS Site http://HarborWebs.com:8081 (1:379/1.45)
SEEN-BY: 633/267 270
@PATH: 379/1 633/267

SOURCE: echomail via fidonet.ozzmosis.com

Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.