Page 29 of 147 results (0.004 seconds)

CVSS: 6.8EPSS: 10%CPEs: 1EXPL: 0

Heap-based buffer overflow in Apple QuickTime before 7.3.1 allows remote attackers to execute arbitrary code via a crafted QTL file. Desbordamiento de búfer basado en pila en Apple QuickTime anterior a 7.3.1 permite a atacantes remotos ejecutar código de su elección mediante un fichero QTL artesanal. • http://docs.info.apple.com/article.html?artnum=307176 http://lists.apple.com/archives/Security-announce/2007/Dec/msg00000.html http://osvdb.org/40883 http://secunia.com/advisories/28092 http://www.securityfocus.com/bid/26868 http://www.securitytracker.com/id?1019099 http://www.vupen.com/english/advisories/2007/4217 https://exchange.xforce.ibmcloud.com/vulnerabilities/39029 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 9.3EPSS: 2%CPEs: 1EXPL: 0

Multiple unspecified vulnerabilities in the Flash media handler in Apple QuickTime before 7.3.1 allow remote attackers to execute arbitrary code or have other unspecified impacts via a crafted QuickTime movie. Múltiples vulnerabilidades sin especificar en el manejador Flash de Apple QuickTime, en versiones anteriores a la 7.3.1, permite que atacantes remotos ejecuten código a su elección, o que se produzcan otros impactos no especificados a través de películas QuickTime manipuladas. • http://docs.info.apple.com/article.html?artnum=307176 http://lists.apple.com/archives/Security-announce/2007/Dec/msg00000.html http://secunia.com/advisories/28092 http://www.securityfocus.com/bid/26866 http://www.securitytracker.com/id?1019099 http://www.vupen.com/english/advisories/2007/4217 https://exchange.xforce.ibmcloud.com/vulnerabilities/39030 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 9.3EPSS: 96%CPEs: 40EXPL: 8

Stack-based buffer overflow in Apple QuickTime before 7.3.1, as used in QuickTime Player on Windows XP and Safari on Mac OS X, allows remote Real Time Streaming Protocol (RTSP) servers to execute arbitrary code via an RTSP response with a long Content-Type header. Un desbordamiento de búfer en la región stack de la memoria en Apple QuickTime anterior a la versión 7.3.1, como es usado en QuickTime Player en Windows XP y Safari en Mac OS X, permite a servidores remotos de Real Time Streaming Protocol (RTSP) ejecutar código arbitrario por medio de una respuesta RTSP con un encabezado Content-Type largo. • https://www.exploit-db.com/exploits/4648 https://www.exploit-db.com/exploits/16873 https://www.exploit-db.com/exploits/6013 https://www.exploit-db.com/exploits/4657 https://www.exploit-db.com/exploits/4664 https://www.exploit-db.com/exploits/4651 https://www.exploit-db.com/exploits/11027 https://www.exploit-db.com/exploits/16424 http://docs.info.apple.com/article.html?artnum=307176 http://lists.apple.com/archives/Security-announce/2007/Dec/msg00000.html http:/& • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 9.3EPSS: 76%CPEs: 6EXPL: 0

Unspecified vulnerability in QuickTime for Java in Apple QuickTime before 7.3 allows remote attackers to execute arbitrary code via untrusted Java applets that gain privileges via unspecified vectors. Vulnerabilidad no especificada en QuickTime para Java de Apple QuickTime anterior a 7.3 permite a atacantes remotos ejecutar código de su elección mediante applets Java no confiables que obtienen privilegios a través de vectores no especificados. • http://docs.info.apple.com/article.html?artnum=306896 http://lists.apple.com/archives/Security-announce/2007/Nov/msg00000.html http://osvdb.org/38548 http://secunia.com/advisories/27523 http://www.kb.cert.org/vuls/id/319771 http://www.securityfocus.com/bid/26339 http://www.securitytracker.com/id?1018894 http://www.us-cert.gov/cas/techalerts/TA07-310A.html http://www.vupen.com/english/advisories/2007/3723 https://exchange.xforce.ibmcloud.com/vulnerabilities/38271 •

CVSS: 9.3EPSS: 53%CPEs: 6EXPL: 0

Heap-based buffer overflow in the QuickTime VR extension 7.2.0.240 in QuickTime.qts in Apple QuickTime before 7.3 allows remote attackers to execute arbitrary code via a QTVR (QuickTime Virtual Reality) movie file containing a large size field in the atom header of a panorama sample atom. Un desbordamiento de búfer en la región stack de la memoria en la extensión de QuickTime VR versión 7.2.0.240 en QuickTime.qts en QuickTime de Apple anterior a versión 7.3, permite a los atacantes remotos ejecutar los códigos arbitrarios por medio de un archivo de película QTVR (Realidad Virtual de QuickTime) que contiene un campo de gran tamaño en el encabezado atom de un panorama sample atom. • http://blog.48bits.com/?p=176 http://docs.info.apple.com/article.html?artnum=306896 http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=620 http://lists.apple.com/archives/Security-announce/2007/Nov/msg00000.html http://secunia.com/advisories/27523 http://www.48bits.com/advisories/qt_pdat_heapbof.pdf http://www.osvdb.org/38545 http://www.securityfocus.com/archive/1/483564/100/0/threaded http://www.securityfocus.com/bid/26342 http://www.securitytracker.com& • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •