The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.

Computer vulnerabilities of QuickTime

Apple QuickTime: executing DLL code via the installer
An attacker can create a malicious DLL, and then put it in the current directory of Apple QuickTime, in order to execute code...
CVE-2017-2218, JVN#94771799, VIGILANCE-VUL-22958
Apple QuickTime: multiple vulnerabilities
An attacker can use several vulnerabilities of Apple QuickTime...
CERTFR-2016-AVI-239, CVE-2016-4596, CVE-2016-4597, CVE-2016-4598, CVE-2016-4599, CVE-2016-4600, CVE-2016-4601, CVE-2016-4602, HT206903, VIGILANCE-VUL-20156
Apple QuickTime: two vulnerabilities
An attacker can use several vulnerabilities of Apple QuickTime...
HT205771, VIGILANCE-VUL-19389, ZDI-16-241, ZDI-16-242
Apple QuickTime: nine vulnerabilities
An attacker can use several vulnerabilities of Apple QuickTime...
CERTFR-2016-AVI-006, CVE-2015-7085, CVE-2015-7086, CVE-2015-7087, CVE-2015-7088, CVE-2015-7089, CVE-2015-7090, CVE-2015-7091, CVE-2015-7092, CVE-2015-7117, TALOS-2016-0019, TALOS-2016-0020, TALOS-2016-0021, TALOS-2016-0022, TALOS-2016-0023, VIGILANCE-VUL-18658, ZDI-16-002
QuickTime: nine vulnerabilities
An attacker can use several vulnerabilities of QuickTime...
CERTFR-2015-AVI-362, CVE-2015-3788, CVE-2015-3789, CVE-2015-3790, CVE-2015-3791, CVE-2015-3792, CVE-2015-5751, CVE-2015-5779, CVE-2015-5785, CVE-2015-5786, HT205046, VIGILANCE-VUL-17727
Apple QuickTime: multiple vulnerabilities
An attacker can use several vulnerabilities of Apple QuickTime...
CERTFR-2015-AVI-274, CVE-2015-3661, CVE-2015-3662, CVE-2015-3663, CVE-2015-3664, CVE-2015-3665, CVE-2015-3666, CVE-2015-3667, CVE-2015-3668, CVE-2015-3669, CVE-2015-3713, VIGILANCE-VUL-17272, ZDI-15-276, ZDI-15-277, ZDI-15-278, ZDI-15-279, ZDI-15-280, ZDI-15-289, ZDI-15-292
Apple QuickTime: multiple vulnerabilities
An attacker can use several vulnerabilities of Apple QuickTime...
APPLE-SA-2014-10-22-1, CERTFR-2014-AVI-441, CVE-2014-1391, CVE-2014-4350, CVE-2014-4351, CVE-2014-4979, VIGILANCE-VUL-15528
Apple QuickTime: memory corruption via MVHD
An attacker can generate a memory corruption via MVHD fields of an Apple QuickTime file, in order to trigger a denial of service, and possibly to execute code...
CVE-2014-4979, VIGILANCE-VUL-15096, ZDI-14-264
QuickTime: multiple vulnerabilities
An attacker can use several vulnerabilities of QuickTime...
APPLE-SA-2014-02-25-3, BID-65784, BID-65786, BID-65787, CERTFR-2014-AVI-090, CVE-2013-1032, CVE-2014-1243, CVE-2014-1244, CVE-2014-1245, CVE-2014-1246, CVE-2014-1247, CVE-2014-1248, CVE-2014-1249, CVE-2014-1250, CVE-2014-1251, VIGILANCE-VUL-14312, ZDI-14-044, ZDI-14-045, ZDI-14-046, ZDI-14-047, ZDI-14-048, ZDI-14-049
QuickTime: multiple vulnerabilities
An attacker can invite the victim to display malicious documents with QuickTime, in order to execute code on his computer...
BID-60086, BID-60092, BID-60097, BID-60098, BID-60099, BID-60100, BID-60101, BID-60102, BID-60103, BID-60104, BID-60108, BID-60109, BID-60110, CERTA-2013-AVI-326, CVE-2013-0986, CVE-2013-0987, CVE-2013-0988, CVE-2013-0989, CVE-2013-1015, CVE-2013-1016, CVE-2013-1017, CVE-2013-1018, CVE-2013-1019, CVE-2013-1020, CVE-2013-1021, CVE-2013-1022, HT5770, VIGILANCE-VUL-12853, ZDI-13-080, ZDI-13-110, ZDI-13-111, ZDI-13-112, ZDI-13-113, ZDI-13-114, ZDI-13-115, ZDI-13-116, ZDI-13-117, ZDI-13-118, ZDI-13-119
Our database contains other pages. You can request a free trial to read them.