This Metasploit module exploits a vulnerability found in Apple QuickTime.
>> CATEGORY: iphone
This Metasploit module exploits a vulnerability found in Apple QuickTime.
Zero Day Initiative Advisory 12-108 – This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple Quicktime. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
Zero Day Initiative Advisory 12-109 – This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple Quicktime. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file
Zero Day Initiative Advisory 12-107 – This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple Quicktime. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of XML elements within a TeXML file
Zero Day Initiative Advisory 12-107 – This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple Quicktime.
Zero Day Initiative Advisory 12-105 – This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple Quicktime. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
Security Explorations does not agree with Apple’s evaluation of a vulnerability they reported. They have decided to release proof of concept code to demonstrate a bypass vulnerability in Apple QuickTime Java extensions.
Senator: Amazon.com pulls plug on WikiLeaks site after inquiries Puget Sound Business Journal (blog) Days after reports emerged that the WikiLeaks website had found safe haven in Amazon.com's…
Zero Day Initiative Advisory 12-095 – This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple Quicktime. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of XML elements within a TeXML file.
Repressive Ecuador odd choice for WikiLeaks ' Julian Assange's …