Memory corruption vulnerabilities found in Apple QuickTime. Can lead to denial of service or execution of arbitrary code via a specially designed file. Update to the latest version
Reporter | Title | Published | Views | Family All 54 |
---|---|---|---|---|
![]() | APPLE-SA-2015-06-30-5 QuickTime 7.7.7 | 5 Jul 201500:00 | – | securityvulns |
![]() | Apple QuickTime multiple security vulnerabilities | 5 Jul 201500:00 | – | securityvulns |
![]() | Apple Mac OS X / EFI multiple security vulnerabilities | 5 Jul 201500:00 | – | securityvulns |
![]() | APPLE-SA-2015-06-30-2 OS X Yosemite v10.10.4 and Security Update 2015-005 | 5 Jul 201500:00 | – | securityvulns |
![]() | Apple QuickTime < 7.7.7 Multiple Vulnerabilities (Windows) | 3 Jul 201500:00 | – | nessus |
![]() | Mac OS X Multiple Vulnerabilities (Security Update 2015-005) (GHOST) (Logjam) | 1 Jul 201500:00 | – | nessus |
![]() | Mac OS X 10.10.x < 10.10.4 Multiple Vulnerabilities (GHOST) (Logjam) | 1 Jul 201500:00 | – | nessus |
![]() | CVE-2015-3666 | 3 Jul 201501:00 | – | cvelist |
![]() | CVE-2015-3667 | 3 Jul 201501:00 | – | cvelist |
![]() | CVE-2015-3668 | 3 Jul 201501:00 | – | cvelist |
Source | Link |
---|---|
support | www.support.apple.com/en-us/HT204947 |
threats | www.threats.kaspersky.com/en/product/Apple-QuickTime/ |
statistics | www.statistics.securelist.com/ |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo