Page 35 of 176 results (0.006 seconds)

CVSS: 5.1EPSS: 13%CPEs: 23EXPL: 0

Multiple buffer overflows in Apple QuickTime before 7.1.3 allow user-assisted remote attackers to execute arbitrary code via a crafted QuickTime movie. Múltiples desbordamientos de búfer en Apple QuickTime anterior a 7.1.3 permite a atacantes con la complicidad del usuario ejecutar código de su elección a través de una película QuickTime modificada. • http://docs.info.apple.com/article.html?artnum=304357 http://lists.apple.com/archives/Security-announce/2006/Sep/msg00000.html http://secunia.com/advisories/21893 http://secunia.com/advisories/29182 http://security.gentoo.org/glsa/glsa-200803-08.xml http://securityreason.com/securityalert/1554 http://securitytracker.com/id?1016830 http://www.kb.cert.org/vuls/id/683700 http://www.osvdb.org/28772 http://www.securityfocus.com/archive/1/445888/100/0/threaded http://www. •

CVSS: 5.1EPSS: 74%CPEs: 22EXPL: 2

Heap-based buffer overflow in Apple QuickTime before 7.1.3 allows user-assisted remote attackers to execute arbitrary code via the COLOR_64 chunk in a FLIC (FLC) movie. Desbordamiento de búfer basado en montón en Apple QuickTime anterior a 7.1.3 permite a un atacante con la complicidad del usuario ejecutar código de su elección a través de un trozo de COLOR_64 en una película FLIC(FLC). • https://www.exploit-db.com/exploits/28521 http://docs.info.apple.com/article.html?artnum=304357 http://lists.apple.com/archives/Security-announce/2006/Sep/msg00000.html http://secunia.com/advisories/21893 http://secunia.com/advisories/29182 http://security.gentoo.org/glsa/glsa-200803-08.xml http://securityreason.com/securityalert/1554 http://securitytracker.com/id?1016830 http://www.idefense.com/intelligence/vulnerabilities/display.php?id=413 http://www.kb.cert.org/vuls/id/489836& •

CVSS: 5.1EPSS: 8%CPEs: 22EXPL: 0

Buffer overflow in Apple QuickTime before 7.1.3 allows user-assisted remote attackers to execute arbitrary code via a crafted SGI image. Desbordamiento de búfer en Apple QuickTime anterior a 7.1.3 permite a un atacante con la complicidad del usuario ejecutar código de su elección a rtavés de una imagen artesanal SGI. • http://docs.info.apple.com/article.html?artnum=304357 http://lists.apple.com/archives/Security-announce/2006/Sep/msg00000.html http://secunia.com/advisories/21893 http://secunia.com/advisories/29182 http://security.gentoo.org/glsa/glsa-200803-08.xml http://securityreason.com/securityalert/1554 http://securitytracker.com/id?1016830 http://www.kb.cert.org/vuls/id/308204 http://www.osvdb.org/28768 http://www.securityfocus.com/archive/1/445888/100/0/threaded http://www. •

CVSS: 5.1EPSS: 15%CPEs: 22EXPL: 0

Integer overflow in Apple QuickTime before 7.1.3 allows user-assisted remote attackers to execute arbitrary code via a crafted H.264 movie, a different issue than CVE-2006-4381. Desbordamiento de enteros en Apple QuickTime anterior a 7.1.3 permite a un atacante con la complicidad del usuario ejecutar código de su elección a través de una película H.624 artesanal, una cuestión diferente a CVE-2006-4381. • http://docs.info.apple.com/article.html?artnum=304357 http://lists.apple.com/archives/Security-announce/2006/Sep/msg00000.html http://piotrbania.com/all/adv/quicktime-integer-overflow-h264-adv-7.1.txt http://secunia.com/advisories/21893 http://secunia.com/advisories/29182 http://security.gentoo.org/glsa/glsa-200803-08.xml http://securityreason.com/securityalert/1550 http://securitytracker.com/id?1016830 http://www.kb.cert.org/vuls/id/554252 http://www.osvdb.org/28773 http&# •

CVSS: 5.1EPSS: 10%CPEs: 22EXPL: 0

Integer overflow in Apple QuickTime before 7.1.3 allows user-assisted remote attackers to execute arbitrary code via a crafted FlashPix file. Desbordamiento de enteros en Apple QuickTime anterior a 7.1.3 permite a un atacante con la complicidad del usuario ejecutar código de su elección a través de un fichero artesanal FlashPix. • http://docs.info.apple.com/article.html?artnum=304357 http://lists.apple.com/archives/Security-announce/2006/Sep/msg00000.html http://secunia.com/advisories/21893 http://secunia.com/advisories/29182 http://security.gentoo.org/glsa/glsa-200803-08.xml http://securityreason.com/securityalert/1554 http://securitytracker.com/id?1016830 http://www.kb.cert.org/vuls/id/200316 http://www.osvdb.org/28770 http://www.securityfocus.com/archive/1/445888/100/0/threaded http://www. •