Page 32 of 190 results (0.004 seconds)

CVSS: 5.1EPSS: 13%CPEs: 23EXPL: 0

Multiple buffer overflows in Apple QuickTime before 7.1.3 allow user-assisted remote attackers to execute arbitrary code via a crafted QuickTime movie. Múltiples desbordamientos de búfer en Apple QuickTime anterior a 7.1.3 permite a atacantes con la complicidad del usuario ejecutar código de su elección a través de una película QuickTime modificada. • http://docs.info.apple.com/article.html?artnum=304357 http://lists.apple.com/archives/Security-announce/2006/Sep/msg00000.html http://secunia.com/advisories/21893 http://secunia.com/advisories/29182 http://security.gentoo.org/glsa/glsa-200803-08.xml http://securityreason.com/securityalert/1554 http://securitytracker.com/id?1016830 http://www.kb.cert.org/vuls/id/683700 http://www.osvdb.org/28772 http://www.securityfocus.com/archive/1/445888/100/0/threaded http://www. •

CVSS: 5.1EPSS: 37%CPEs: 22EXPL: 2

Integer overflow in Apple QuickTime before 7.1.3 allows user-assisted remote attackers to execute arbitrary code via a crafted H.264 movie. Desbordamiento de búfer en Apple QuickTime anterior a 7.1.3 permite a un atacante con la complicidad del usuario ejecutar código de su elección a través de una película artesanal H.624 • http://docs.info.apple.com/article.html?artnum=304357 http://lists.apple.com/archives/Security-announce/2006/Sep/msg00000.html http://secunia.com/advisories/21893 http://securityreason.com/securityalert/1551 http://securitytracker.com/id?1016830 http://secway.org/advisory/AD20060912.txt http://www.osvdb.org/28774 http://www.securityfocus.com/archive/1/445830/100/0/threaded http://www.securityfocus.com/bid/19976 http://www.vupen.com/english/advisories/2006/3577 https://exchang •

CVSS: 5.1EPSS: 10%CPEs: 22EXPL: 0

Integer overflow in Apple QuickTime before 7.1.3 allows user-assisted remote attackers to execute arbitrary code via a crafted FlashPix file. Desbordamiento de enteros en Apple QuickTime anterior a 7.1.3 permite a un atacante con la complicidad del usuario ejecutar código de su elección a través de un fichero artesanal FlashPix. • http://docs.info.apple.com/article.html?artnum=304357 http://lists.apple.com/archives/Security-announce/2006/Sep/msg00000.html http://secunia.com/advisories/21893 http://secunia.com/advisories/29182 http://security.gentoo.org/glsa/glsa-200803-08.xml http://securityreason.com/securityalert/1554 http://securitytracker.com/id?1016830 http://www.kb.cert.org/vuls/id/200316 http://www.osvdb.org/28770 http://www.securityfocus.com/archive/1/445888/100/0/threaded http://www. •

CVSS: 5.1EPSS: 8%CPEs: 22EXPL: 0

Buffer overflow in Apple QuickTime before 7.1.3 allows user-assisted remote attackers to execute arbitrary code via a crafted SGI image. Desbordamiento de búfer en Apple QuickTime anterior a 7.1.3 permite a un atacante con la complicidad del usuario ejecutar código de su elección a rtavés de una imagen artesanal SGI. • http://docs.info.apple.com/article.html?artnum=304357 http://lists.apple.com/archives/Security-announce/2006/Sep/msg00000.html http://secunia.com/advisories/21893 http://secunia.com/advisories/29182 http://security.gentoo.org/glsa/glsa-200803-08.xml http://securityreason.com/securityalert/1554 http://securitytracker.com/id?1016830 http://www.kb.cert.org/vuls/id/308204 http://www.osvdb.org/28768 http://www.securityfocus.com/archive/1/445888/100/0/threaded http://www. •

CVSS: 5.1EPSS: 74%CPEs: 22EXPL: 2

Heap-based buffer overflow in Apple QuickTime before 7.1.3 allows user-assisted remote attackers to execute arbitrary code via the COLOR_64 chunk in a FLIC (FLC) movie. Desbordamiento de búfer basado en montón en Apple QuickTime anterior a 7.1.3 permite a un atacante con la complicidad del usuario ejecutar código de su elección a través de un trozo de COLOR_64 en una película FLIC(FLC). • https://www.exploit-db.com/exploits/28521 http://docs.info.apple.com/article.html?artnum=304357 http://lists.apple.com/archives/Security-announce/2006/Sep/msg00000.html http://secunia.com/advisories/21893 http://secunia.com/advisories/29182 http://security.gentoo.org/glsa/glsa-200803-08.xml http://securityreason.com/securityalert/1554 http://securitytracker.com/id?1016830 http://www.idefense.com/intelligence/vulnerabilities/display.php?id=413 http://www.kb.cert.org/vuls/id/489836& •