Download
| Alert*
oval:org.secpod.oval:def:11698
The host is installed with Apple QuickTime before 7.74.80.86 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle dref atoms. Successful exploitation could allow attackers to execute arbitrary code or crash the service. oval:org.secpod.oval:def:11699 The host is installed with Apple QuickTime before 7.74.80.86 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle H.263 encoded movie files. Successful exploitation could allow attackers to execute arbitrary code or crash the service. oval:org.secpod.oval:def:11696 The host is installed with Apple QuickTime before 7.74.80.86 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle a crafted TeXML file. Successful exploitation could allow attackers to execute arbitrary code or crash the service. oval:org.secpod.oval:def:11697 The host is installed with Apple QuickTime before 7.74.80.86 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle H.263 encoded movie files. Successful exploitation could allow attackers to execute arbitrary code or crash the service. oval:org.secpod.oval:def:11700 The host is installed with Apple QuickTime before 7.74.80.86 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle Sorenson encoded movie files. Successful exploitation could allow attackers to execute arbitrary code or crash the servic ... oval:org.secpod.oval:def:11701 The host is installed with Apple QuickTime before 7.74.80.86 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle JPEG encoded data. Successful exploitation could allow attackers to execute arbitrary code or crash the service. oval:org.secpod.oval:def:11702 The host is installed with Apple QuickTime before 7.74.80.86 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle JPEG encoded data. Successful exploitation could allow attackers to execute arbitrary code or crash the service. oval:org.secpod.oval:def:11703 The host is installed with Apple QuickTime before 7.74.80.86 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle 'mvhd' atoms. Successful exploitation could allow attackers to execute arbitrary code or crash the service. oval:org.secpod.oval:def:11704 The host is installed with Apple QuickTime before 7.74.80.86 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle 'mvhd' atoms. Successful exploitation could allow attackers to execute arbitrary code or crash the service. oval:org.secpod.oval:def:11692 The host is installed with Apple QuickTime before 7.74.80.86 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle 'enof' atoms. Successful exploitation could allow attackers to execute arbitrary code or crash the service. oval:org.secpod.oval:def:11693 The host is installed with Apple QuickTime before 7.74.80.86 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle a crafted QTIF file. Successful exploitation could allow attackers to execute arbitrary code or crash the service. oval:org.secpod.oval:def:11694 The host is installed with Apple QuickTime before 7.74.80.86 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle a crafted FPX file. Successful exploitation could allow attackers to execute arbitrary code or crash the service. oval:org.secpod.oval:def:11695 The host is installed with Apple QuickTime before 7.74.80.86 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle crafted MP3 files. Successful exploitation could allow attackers to execute arbitrary code or crash the service. |