Zero Day Initiative Advisory 11-303 – This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple Quicktime. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the way Quicktime handles H.264 streams.
Tags:
Apple,
exploit,
movie,
stream-it-reads,
Vulnerability
Zero Day Initiative Advisory 11-277 – This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple QuickTime. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the way QuickTime handles ‘mp4v’ codec information.
Tags:
Apple,
data,
exploit,
Vulnerability
Zero Day Initiative Advisory 11-259 – This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple QuickTime. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the way QuickTime handles corrupt Sample Size atoms
Tags:
atom,
exploit,
Vulnerability
Zero Day Initiative Advisory 11-258 – This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple QuickTime.
Tags:
atom,
sample,
Vulnerability
Zero Day Initiative Advisory 11-254 – This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple QuickTime. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
Tags:
allocation,
Apple,
exploit,
Vulnerability
Zero Day Initiative Advisory 11-251 – This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple Quicktime. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the way Quicktime handles invalid values in the Sync Sample Atom.
Tags:
sample,
table-values,
Vulnerability
Zero Day Initiative Advisory 11-243 – This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Webkit as utilized by either Apple Safari, or Google’s Chrome browser. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within how the library handles implicitly defined styles
Tags:
Apple,
Application,
exploit,
Vulnerability
Zero Day Initiative Advisory 11-242 – This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple Safari’s Webkit.
Tags:
Apple,
Application,
exploit,
reference,
Vulnerability
Zero Day Initiative Advisory 11-230 – This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple Quicktime. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the way Quicktime handles Apple Lossless Audio Codec streams.
Tags:
Apple,
audio,
exploit,
Vulnerability
Zero Day Initiative Advisory 11-229 – This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple QuickTime. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within how the application parses a specially formatted RIFF WAV file
Tags:
Apple,
exploit,
implementation,
language,
Vulnerability