Microsoft Windows Media Player File Attachment Script Execution Vulnerability

"http-equiv@excite.com" <http-equiv@malware.com> has provided proof of concept information in the referenced BugTraq message.


 

Privacy Statement
Copyright 2010, SecurityFocus