China piracy spurred Apple action:WikiLeak – Ninemsn
China piracy spurred Apple action: WikiLeak Ninemsn Apple set up a global security team three years ago to combat rampant counterfeiting of the iPod and iPhone in China, according to a US diplomatic cable released by WikiLeaks . The California-based gadget-maker hired away employees from the drug company ... and more
Zero Day Initiative Advisory 11-257
Zero Day Initiative Advisory 11-257 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple's QuickTime Player. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within how the application parses a frame within an H.264 encoded movie
Zero Day Initiative Advisory 11-256
Zero Day Initiative Advisory 11-256 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple QuickTime. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
Zero Day Initiative Advisory 11-255
Zero Day Initiative Advisory 11-255 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple QuickTime Player. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within how the application parses a frame within an H.264 encoded movie
Zero Day Initiative Advisory 11-254
Zero Day Initiative Advisory 11-254 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple QuickTime. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
Zero Day Initiative Advisory 11-252
Zero Day Initiative Advisory 11-252 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple Quicktime. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the way Quicktime handles the PnSize PICT opcode
Zero Day Initiative Advisory 11-250
Zero Day Initiative Advisory 11-250 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple Quicktime.
Apple Security Advisory 2011-08-03-1
Apple Security Advisory 2011-08-03-1 - QuickTime version 7.7 has been made available to address multiple code execution, cross-origin, integer overflow, memory corruption, and other vulnerabilities.
Secunia Security Advisory 45516
Secunia Security Advisory - Multiple vulnerabilities have been reported in Apple QuickTime, which can be exploited by malicious people to compromise a user's system.
Zero Day Initiative Advisory 11-243
Zero Day Initiative Advisory 11-243 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Webkit as utilized by either Apple Safari, or Google's Chrome browser. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within how the library handles implicitly defined styles