Page 41 of 211 results (0.009 seconds)

CVSS: 5.1EPSS: 1%CPEs: 7EXPL: 0

Integer overflow in Apple QuickTime before 7.0.3 allows user-assisted attackers to execute arbitrary code via a crafted MOV file that causes a sign extension of the length element in a Pascal style string. • http://docs.info.apple.com/article.html?artnum=302772 http://pb.specialised.info/all/adv/quicktime-mov-io1-adv.txt http://secunia.com/advisories/17428 http://securitytracker.com/id?1015152 http://www.osvdb.org/20475 http://www.securityfocus.com/archive/1/415712/30/0/threaded http://www.securityfocus.com/bid/15306 http://www.vupen.com/english/advisories/2005/2293 • CWE-189: Numeric Errors •

CVSS: 7.5EPSS: 3%CPEs: 3EXPL: 0

The Java extensions for QuickTime 6.52 and earlier in Apple Mac OS X 10.3.9 allow untrusted applets to call arbitrary functions in system libraries, which allows remote attackers to execute arbitrary code. • http://lists.apple.com/archives/security-announce/2005/Sep/msg00002.html http://secunia.com/advisories/16920 http://www.auscert.org.au/5509 http://www.ciac.org/ciac/bulletins/p-312.shtml •

CVSS: 5.0EPSS: 0%CPEs: 1EXPL: 0

Apple QuickTime Player 7.0 on Mac OS X 10.4 allows remote attackers to obtain sensitive information via a .mov file with a Quartz Composer composition (.qtz) file that uses certain patches to read local information, then other patches to send the information to the attacker. • http://archives.neohapsis.com/archives/fulldisclosure/2005-05/0265.html http://docs.info.apple.com/article.html?artnum=301714 http://lists.apple.com/archives/quartzcomposer-dev/2005/May/msg00250.html http://lists.apple.com/archives/quartzcomposer-dev/2005/May/msg00263.html http://lists.apple.com/archives/security-announce/2005/May/msg00006.html http://remahl.se/david/vuln/018 http://secunia.com/advisories/15307 http://securitytracker.com/id?1013961 http://www.osvdb.org/16376 http:&# •

CVSS: 7.5EPSS: 0%CPEs: 35EXPL: 0

AFP Server on Mac OS X 10.3.x to 10.3.5, when a guest has mounted an AFP volume, allows the guest to "terminate authenticated user mounts" via modified SessionDestroy packets. • http://lists.apple.com/archives/security-announce/2004/Oct/msg00000.html http://www.securityfocus.com/bid/11322 •

CVSS: 5.0EPSS: 0%CPEs: 35EXPL: 0

AFP Server on Mac OS X 10.3.x to 10.3.5, under certain conditions, does not properly set the guest group ID, which causes AFP to change a write-only AFP Drop Box to be read-write when the Drop Box is on a share that is mounted by a guest, which allows attackers to read the Drop Box. • http://lists.apple.com/archives/security-announce/2004/Oct/msg00000.html http://www.securityfocus.com/bid/11322 •