CVE-2010-1799 (GCVE-0-2010-1799)
Vulnerability from cvelistv5
Published
2010-08-16 18:25
Modified
2024-08-07 01:35
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Stack-based buffer overflow in the error-logging functionality in Apple QuickTime before 7.6.7 on Windows allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted movie file.
References
► | URL | Tags | |||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T01:35:53.717Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.apple.com/kb/HT4290" }, { "name": "oval:org.mitre.oval:def:11800", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11800" }, { "name": "APPLE-SA-2010-08-12-1", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2010//Aug/msg00002.html" }, { "name": "41962", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/41962" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-08-12T00:00:00", "descriptions": [ { "lang": "en", "value": "Stack-based buffer overflow in the error-logging functionality in Apple QuickTime before 7.6.7 on Windows allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted movie file." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-18T12:57:01", "orgId": "286789f9-fbc2-4510-9f9a-43facdede74c", "shortName": "apple" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.apple.com/kb/HT4290" }, { "name": "oval:org.mitre.oval:def:11800", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11800" }, { "name": "APPLE-SA-2010-08-12-1", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2010//Aug/msg00002.html" }, { "name": "41962", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/41962" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "product-security@apple.com", "ID": "CVE-2010-1799", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Stack-based buffer overflow in the error-logging functionality in Apple QuickTime before 7.6.7 on Windows allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted movie file." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://support.apple.com/kb/HT4290", "refsource": "CONFIRM", "url": "http://support.apple.com/kb/HT4290" }, { "name": "oval:org.mitre.oval:def:11800", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11800" }, { "name": "APPLE-SA-2010-08-12-1", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2010//Aug/msg00002.html" }, { "name": "41962", "refsource": "BID", "url": "http://www.securityfocus.com/bid/41962" } ] } } } }, "cveMetadata": { "assignerOrgId": "286789f9-fbc2-4510-9f9a-43facdede74c", "assignerShortName": "apple", "cveId": "CVE-2010-1799", "datePublished": "2010-08-16T18:25:00", "dateReserved": "2010-05-06T00:00:00", "dateUpdated": "2024-08-07T01:35:53.717Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2010-1799\",\"sourceIdentifier\":\"product-security@apple.com\",\"published\":\"2010-08-16T18:39:40.467\",\"lastModified\":\"2025-04-11T00:51:21.963\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Stack-based buffer overflow in the error-logging functionality in Apple QuickTime before 7.6.7 on Windows allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted movie file.\"},{\"lang\":\"es\",\"value\":\"Desbordamiento de buffer basado en pila en la funcionalidad \\\"error-logging\\\" de Apple QuickTime en versiones anteriores a la v7.6.7 en Windows permite a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n o provocar una denegaci\u00f3n de servicio (ca\u00edda de la aplicaci\u00f3n) a trav\u00e9s de un fichero de video modificado.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:C/I:C/A:C\",\"baseScore\":9.3,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":8.6,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-119\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EA5969D4-3D98-490E-89B6-FF7765E78C40\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1EE08FAE-0862-4C36-95BC-878B04CBF397\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D8F310A8-F760-4059-987D-42369F360DE4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:4.1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F71BC599-FCBE-4F1F-AA24-41AF91F82226\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:4.1.2:*:*:*:*:windows:*:*\",\"matchCriteriaId\":\"091D0A7B-BF43-426F-9D8E-E6496F3F9E0F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:4.1.2:*:*:ja:*:*:*:*\",\"matchCriteriaId\":\"D1A8DAA3-7256-40A1-B5FF-61447534B3F3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"41473E1D-B988-4312-B16B-D340508DD473\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:5.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FCC2EBC0-F2A6-4709-9A27-CF63BC578744\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:5.0.1:*:*:*:*:windows:*:*\",\"matchCriteriaId\":\"B8A3F122-EF53-4C7C-9D07-7D8313087CFB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:5.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"844E1B14-A13A-47F1-9C82-02EAEED1A911\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:5.0.2:*:*:*:*:windows:*:*\",\"matchCriteriaId\":\"0F357064-9764-4847-9568-B836E4C56C6C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"80747BDD-70E9-4E74-896F-C79D014F1B2D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:6.0:*:*:*:*:windows:*:*\",\"matchCriteriaId\":\"028FB483-06E7-41CA-8BD6-3BB7E1C99139\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:6.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4A4C6772-CD24-46FD-AEBE-BF8BB16B5BB4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:6.0.0:*:*:*:*:windows:*:*\",\"matchCriteriaId\":\"43A62A6A-F485-45F6-B009-586E8FBCF29F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:6.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"85ADED98-62C6-4961-894C-1D26E3B3EE5E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:6.0.1:*:*:*:*:windows:*:*\",\"matchCriteriaId\":\"453D7355-E449-4E12-979D-BA88C41D5618\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:6.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F522CEA4-B3BB-4C94-B070-6679EEA43439\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:6.0.2:*:*:*:*:windows:*:*\",\"matchCriteriaId\":\"8266929A-943A-4E61-8CB1-560DCF6138CE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:6.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EA1E140B-BCB4-4B3C-B287-E9E944E08DB0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:6.1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0B630944-F838-4C02-90D4-F5EB2A073CA2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:6.1.0:*:*:*:*:windows:*:*\",\"matchCriteriaId\":\"CE5D41D0-5E83-4758-B7A3-92E23E19107C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:6.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9066C81B-A69F-450D-8606-5E29AF1AD286\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:6.1.1:*:*:*:*:windows:*:*\",\"matchCriteriaId\":\"8534D4B9-5E58-4392-A62F-E2110AD8942D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:6.2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"71285AD2-3966-4817-B630-8335BE985D56\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:6.2.0:*:*:*:*:windows:*:*\",\"matchCriteriaId\":\"F1C066D2-D519-4835-82E7-3EB26152A26D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:6.3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2458480E-F222-452A-AB21-933F924F8F6F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:6.3.0:*:*:*:*:windows:*:*\",\"matchCriteriaId\":\"7CE76835-F623-46AD-AE3D-8558CA7CF9A9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:6.4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"30C83A78-6BB9-443E-B508-CC6F8D157A6E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:6.4.0:*:*:*:*:windows:*:*\",\"matchCriteriaId\":\"EC9DB8CB-23AF-4030-A363-8535DDA08933\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:6.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9C7CB5C4-9A5A-4831-8FFD-0D261619A7DE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:6.5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"61463F4F-BBE0-42AA-AC22-8F39E94EB520\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:6.5.0:*:*:*:*:windows:*:*\",\"matchCriteriaId\":\"BB42F605-0665-4615-90FC-E640AB3A8AC6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:6.5.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D2CE0B67-0794-472D-A2C0-CC5CA0E36370\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:6.5.1:*:*:*:*:windows:*:*\",\"matchCriteriaId\":\"5424653A-EC5B-435D-BF8C-5E1D3C91E68E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:6.5.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3A5DDF47-5AA5-4EE3-B12D-9218F528EFE1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:6.5.2:*:*:*:*:windows:*:*\",\"matchCriteriaId\":\"55CAEDE3-8FCD-4EFF-9ACC-DA4C8252001A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F075BA0F-4A96-4F25-AF1D-C64C7DCE1CDC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:7.0:*:*:*:*:windows:*:*\",\"matchCriteriaId\":\"2986D6F8-F209-4EF1-86AD-7D0B1EE87053\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:7.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F43E39C4-6A08-4C38-BC7D-573F40978527\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:7.0.0:*:*:*:*:windows:*:*\",\"matchCriteriaId\":\"B1C234AB-0F19-40EA-AB89-6DBE854B8999\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:7.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8692B488-129A-49EA-AF84-6077FCDBB898\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:7.0.1:*:*:*:*:windows:*:*\",\"matchCriteriaId\":\"4D6E5814-6BB5-4169-957C-57E296424186\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:7.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1758610B-3789-489E-A751-386D605E5A08\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:7.0.2:*:*:*:*:windows:*:*\",\"matchCriteriaId\":\"B07F1E08-9676-45DC-B1A9-0DCDE4FA90CF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:7.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B535737C-BF32-471C-B26A-588632FCC427\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:7.0.3:*:*:*:*:windows:*:*\",\"matchCriteriaId\":\"BD1BBB64-70E8-4B85-A153-3F5271EE57E3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:7.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DF2C61F8-B376-40F9-8677-CADCC3295915\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:7.0.4:*:*:*:*:windows:*:*\",\"matchCriteriaId\":\"4D70D124-3000-4F28-9ED1-87ABD6B4390A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:7.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6254BB56-5A25-49DC-A851-3CCA249BD71D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:7.1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AC0E0EA8-2947-44F9-BCFA-F4CFA34E9EFD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:7.1.0:*:*:*:*:windows:*:*\",\"matchCriteriaId\":\"3B540730-E5E1-48B4-802A-9A803C1364FE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:7.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"795E3354-7824-4EF4-A788-3CFEB75734E4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:7.1.1:*:*:*:*:windows:*:*\",\"matchCriteriaId\":\"6B839C26-A240-426B-A9D9-A0B0E6ABD674\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:7.1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9419A1E9-A0DA-4846-8959-BE50B53736E5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:7.1.2:*:*:*:*:windows:*:*\",\"matchCriteriaId\":\"BE165F40-407F-4773-BEC7-3526DA7F5B7E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:7.1.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"952A8015-B18B-481C-AC17-60F0D7EEE085\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:7.1.3:*:*:*:*:windows:*:*\",\"matchCriteriaId\":\"BB1C3D77-BB6D-4AAF-A851-68A6541C94A9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:7.1.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3E518B27-A79B-43A4-AFA6-E59EF8E944D3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:7.1.4:*:*:*:*:windows:*:*\",\"matchCriteriaId\":\"59136F76-D775-4849-B938-72F54459E6FF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:7.1.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AEC6EF36-93B3-49BB-9A6F-1990E3F4170E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:7.1.5:*:*:*:*:windows:*:*\",\"matchCriteriaId\":\"67754528-86A5-4D68-8F74-60EFBC2D955A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:7.1.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1A1B5F2F-CDBF-4AEF-9F78-0C010664B9E9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:7.1.6:*:*:*:*:java:*:*\",\"matchCriteriaId\":\"8C49D705-CA5C-4BC4-9D4A-CF40A881EA03\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:7.1.6:*:*:*:*:windows:*:*\",\"matchCriteriaId\":\"AC490623-E8F3-4FE7-8644-F4841095E8BD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:7.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"98C9B657-5484-4458-861E-D6FB5019265A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:7.2:*:vista:*:*:*:*:*\",\"matchCriteriaId\":\"6F1AC0EA-202C-47F8-8104-C10A5BBEDF1F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:7.2:*:windows_sp_2:*:*:*:*:*\",\"matchCriteriaId\":\"D58D067C-D506-4B8D-A671-C19BA766EB71\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:7.2:*:windows_vista:*:*:*:*:*\",\"matchCriteriaId\":\"92C765C2-0709-4343-B474-35629729C875\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:7.2:*:windows_xp:*:*:*:*:*\",\"matchCriteriaId\":\"FBA37276-D6FD-42B7-AD31-00A0AC81FEF1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:7.2:*:windows_xp_sp2:*:*:*:*:*\",\"matchCriteriaId\":\"33CC9D0A-24CA-413D-B4AC-766A79F4B5AE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:7.2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B84D320E-ACA2-4B6E-B682-00202B9ADF2F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:7.2.0:*:*:*:*:windows:*:*\",\"matchCriteriaId\":\"AF2AF1F7-8AD7-40DE-86A3-E2A7B2785360\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:7.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"81E0F160-4B70-45CD-B8AC-AB30ADDB8D2D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:7.2.1:*:*:*:*:windows:*:*\",\"matchCriteriaId\":\"76AC115E-8536-4D1C-8643-D2A78596DE6D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:7.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1EF20D38-BFA3-4403-AB24-7B74EFD68229\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:7.3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"97FEBA83-C845-4334-9B9A-921BA0F44DE3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:7.3.0:*:*:*:*:windows:*:*\",\"matchCriteriaId\":\"69606F59-F68A-48AB-9198-FC5B8990CC61\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:7.3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B2CE2A89-B2FC-413D-A059-526E6DE301BA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:7.3.1:*:*:*:*:windows:*:*\",\"matchCriteriaId\":\"19CA0787-DBDF-4916-9912-08C8D0AC1318\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:7.3.1.70:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7F9F7DCE-EE65-4CD5-AA21-208B2AAF09EF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:7.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"31662D02-7FA9-4FAD-BE49-194B7295CEE1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:7.4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E0C835F2-4F9E-45A6-8112-C2D8CB1A39AD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:7.4.0:*:*:*:*:windows:*:*\",\"matchCriteriaId\":\"22A2CDC9-286A-41C2-AD4E-27C5ADE9C22B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:7.4.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8461AF0A-D4D3-4010-A881-EDBB95003083\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:7.4.1:*:*:*:*:windows:*:*\",\"matchCriteriaId\":\"DB59EFF3-A267-4CE4-872A-AD2C71691000\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:7.4.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A9E1332A-5B4D-4590-BFA5-4557C71F894B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:7.4.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C8E5C77-573F-4EA3-A59C-4A7B11946E93\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:7.4.5:*:*:*:*:windows:*:*\",\"matchCriteriaId\":\"B8120246-AD92-4303-88AD-A4B1E6D2EBE1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:7.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0DC01580-460A-4DC3-BB6D-A9B2254EF6D8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:7.5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8C6E08BF-737E-4512-9BB8-5B4B03A2F8B4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:7.5.0:*:*:*:*:windows:*:*\",\"matchCriteriaId\":\"10ACD705-2B4B-4C98-8270-66C2A2139373\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:7.5.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D22D0674-0EC7-4176-97FB-940F2F7D6AFC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:7.5.5:*:*:*:*:windows:*:*\",\"matchCriteriaId\":\"0BC7845E-1785-4A7F-B1A2-9298FBF71502\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:7.6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8A6470EC-B72B-404C-9E69-03C3FEFD56F4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:7.6.0:*:*:*:*:windows:*:*\",\"matchCriteriaId\":\"CF9286F9-5FE0-40F9-A875-66A294CBCF3D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:7.6.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FA3FB6BA-D0FA-4DC3-8A4D-453C2EE51D09\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:7.6.1:*:*:*:*:windows:*:*\",\"matchCriteriaId\":\"082DB18F-C6DD-4861-8472-2583B12C0BBA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:7.6.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"58F5F530-033D-49D8-ABD5-F4285DA7DA40\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:7.6.6:*:*:*:*:windows:*:*\",\"matchCriteriaId\":\"7A7033AD-038C-42E1-90C2-2E640FAAA667\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2CF61F35-5905-4BA9-AD7E-7DB261D2F256\"}]}]}],\"references\":[{\"url\":\"http://lists.apple.com/archives/security-announce/2010//Aug/msg00002.html\",\"source\":\"product-security@apple.com\",\"tags\":[\"Mailing List\",\"Vendor Advisory\"]},{\"url\":\"http://support.apple.com/kb/HT4290\",\"source\":\"product-security@apple.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/41962\",\"source\":\"product-security@apple.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11800\",\"source\":\"product-security@apple.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://lists.apple.com/archives/security-announce/2010//Aug/msg00002.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Vendor Advisory\"]},{\"url\":\"http://support.apple.com/kb/HT4290\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/41962\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11800\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}" } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…