var-200710-0520
Vulnerability from variot

Argument injection vulnerability in Apple QuickTime 7.2 for Windows XP SP2 and Vista allows remote attackers to execute arbitrary commands via a URL in the qtnext field in a crafted QTL file. NOTE: this issue may be related to CVE-2006-4965 or CVE-2007-5045. Mozilla Firefox does not filter input when sending certain URIs to registered protocol handlers. This may allow a remote, authenticated attacker to use Firefox as a vector for executing commands on a vulnerable system. Apple QuickTime Is Windows And Apple OS X Is a media player that supports. Also, Internet Explorer And Safari , Netscape A compatible browser plug-in is also provided. Web The page creator Web In the page QuickTime Movie When incorporating QuickTime link (.qtl) You can specify parameters for starting an application using a file. One of the parameters that can be specified qtnext Is used to specify the location of multimedia files to import and play. this qtnext A vulnerability exists that allows arbitrary commands to be executed using parameters. QuickTime for Windows is prone to a remote code-execution vulnerability because the application fails to handle URIs securely . Successfully exploiting this issue allows remote attackers to execute arbitrary applications with controlled command-line arguments. This facilitates the remote compromise of affected computers. QuickTime 7.2 running on Microsoft Windows Vista or XP SP2 is vulnerable.


BETA test the new Secunia Personal Software Inspector!

The Secunia PSI detects installed software on your computer and categorises it as either Insecure, End-of-Life, or Up-To-Date. Effectively enabling you to focus your attention on software installations where more secure versions are available from the vendors.

The security issue is caused due to the "-chrome" parameter allowing execution of arbitrary Javascript script code in chrome context. via applications invoking Firefox with unfiltered command line arguments.

This is related to: SA22048 SA25984

The security issue affects Firefox prior to version 2.0.0.7.

SOLUTION: Update to version 2.0.0.7.

NOTE: Support for Firefox 1.5.0.x has ended June 2007. The vendor encourages users to upgrade to Firefox 2.


Try a new way to discover vulnerabilities that ALREADY EXIST in your IT infrastructure.

The Full Featured Secunia Network Software Inspector (NSI) is now available: http://secunia.com/network_software_inspector/

The Secunia NSI enables you to INSPECT, DISCOVER, and DOCUMENT vulnerabilities in more than 4,000 different Windows applications.

The vulnerability is caused due to an input validation error within the handling of system default URIs with registered URI handlers (e.g. "mailto", "news", "nntp", "snews", "telnet"). using Firefox visits a malicious website with a specially crafted "mailto" URI containing a "%" character and ends in a certain extension (e.g. ".bat", ".cmd")

Examples: mailto:test%../../../../windows/system32/calc.exe".cmd nntp:../../../../../Windows/system32/telnet.exe" "secunia.com 80%.bat

Successful exploitation requires that Internet Explorer 7 is installed on the system. Other versions and browsers may also be affected.

SOLUTION: Do not browse untrusted websites or follow untrusted links.

PROVIDED AND/OR DISCOVERED BY: Vulnerability discovered by: * Billy (BK) Rios

Firefox not escaping quotes originally discussed by: * Jesper Johansson

Additional research by Secunia Research.

ORIGINAL ADVISORY: Billy (BK) Rios: http://xs-sniper.com/blog/2007/07/24/remote-command-execution-in-firefox-2005/

OTHER REFERENCES: US-CERT VU#783400: http://www.kb.cert.org/vuls/id/783400

Jesper Johansson blog: http://msinfluentials.com/blogs/jesper/archive/2007/07/20/hey-mozilla-quotes-are-not-legal-in-a-url.aspx


About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.

Subscribe: http://secunia.com/secunia_security_advisories/

Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/

Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.


Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org


. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1

National Cyber Alert System

Technical Cyber Security Alert TA07-297B

Adobe Updates for Microsoft Windows URI Vulnerability

Original release date: October 24, 2007 Last revised: -- Source: US-CERT

Systems Affected

Microsoft Windows XP and Windows Server 2003 systems with Internet Explorer 7 and any of the following Adobe products: * Adobe Reader 8.1 and earlier * Adobe Acrobat Professional, 3D, and Standard 8.1 and earlier * Adobe Reader 7.0.9 and earlier * Adobe Acrobat Professional, 3D, Standard, and Elements 7.0.9 and earlier

Overview

Adobe has released updates for the Adobe Reader and Adobe Acrobat product families. The update addresses a URI handling vulnerability in Microsoft Windows XP and Server 2003 systems with Internet Explorer 7.

I. Description

Installing Microsoft Internet Explorer (IE) 7 on Windows XP or Server 2003 changes the way Windows handles Uniform Resource Identifiers (URIs). This change has introduced a flaw that can cause Windows to incorrectly determine the appropriate handler for the protocol specified in a URI. More information about this vulnerability is available in US-CERT Vulnerability Note VU#403150.

Public reports indicate that this vulnerability is being actively exploited with malicious PDF files. Adobe has released Adobe Reader 8.1.1 and Adobe Acrobat 8.1.1, which mitigate this vulnerability.

II.

III. Solution

Apply an update

Adobe has released Adobe Reader 8.1.1 and Adobe Acrobat 8.1.1 to address this issue.

Disable the mailto: URI in Adobe Reader and Adobe Acrobat

If you are unable to install an updated version of the software, this vulnerability can be mitigated by disabling the mailto: URI handler in Adobe Reader and Adobe Acrobat. Please see Adobe Security Bulletin APSB07-18 for details.

Appendix A. Vendor Information

Adobe

For information about updating affected Adobe products, see Adobe Security Bulletin APSB07-18.

Appendix B. References

* Adobe Security Bulletin APSB07-18 -
  <http://www.adobe.com/support/security/bulletins/apsb07-18.htm>

* Microsoft Security Advisory (943521) -
  <http://www.microsoft.com/technet/security/advisory/943521.mspx>

* US-CERT Vulnerability Note VU#403150 -
  <http://www.kb.cert.org/vuls/id/403150>

The most recent version of this document can be found at:

 <http://www.us-cert.gov/cas/techalerts/TA07-297B.html>

Feedback can be directed to US-CERT Technical Staff. Please send email to cert@cert.org with "TA07-297B Feedback VU#403150" in the subject.


For instructions on subscribing to or unsubscribing from this mailing list, visit http://www.us-cert.gov/cas/signup.html.


Produced 2007 by US-CERT, a government organization.

Terms of use:

 <http://www.us-cert.gov/legal.html>

Revision History

October 24, 2007: Initial release -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.1 (GNU/Linux)

iQEVAwUBRx+8WPRFkHkM87XOAQIrOQf/USsBbfDmKZ4GCi8W2466mI+kZoEHoe/H 3l3p4/1cuFGoPHFfeDLbG+alXiHSAdXoX7Db34InEUKMs7kRUVPEdW9LggI9VaTJ lKnZJxM3dXL+zPCWcDkNqrmmzyJuXwN5FmSXhlcnN4+FRzNrZYwDe1UcOk3q6m1s VNPIBTrqfSuFRllNt+chV1vQ876LLweS+Xh1DIQ/VIyduqvTogoYZO4p2A0YJD57 4y0obNuk+IhgzyhZHtSsR0ql7rGrFr4S97XUQGbKOAZWcDzNGiXJ5FkrMTaP25OI LazBVDofVz8ydUcEkb4belgv5REpfYUJc9hRbRZ+IpbAay2j42m8NQ== =PgB9 -----END PGP SIGNATURE----- .


Want to work within IT-Security?

Secunia is expanding its team of highly skilled security experts. We will help with relocation and obtaining a work permit.

Internet web sites are normally not allowed to link to local resources. It is, however, possible by a malicious web site to open local content in the browser via the "qtnext" attribute of the "embed" tag in a Quicktime Media Link file opened by the QuickTime Plug-In.

NOTE: This does not pose any direct security impact by itself, but may be exploited in combination with other vulnerabilities

Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-200710-0520",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": null,
        "scope": null,
        "trust": 2.4,
        "vendor": "mozilla",
        "version": null
      },
      {
        "model": "quicktime",
        "scope": "eq",
        "trust": 1.9,
        "vendor": "apple",
        "version": "7.2"
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "apple computer",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "adobe",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "microsoft",
        "version": null
      },
      {
        "model": "firefox",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "mozilla",
        "version": "2.0.0.6"
      },
      {
        "model": "seamonkey",
        "scope": null,
        "trust": 0.8,
        "vendor": "mozilla",
        "version": null
      },
      {
        "model": "quicktime",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "apple",
        "version": "7.x"
      },
      {
        "model": "quicktime player",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "7.2"
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#751808"
      },
      {
        "db": "CERT/CC",
        "id": "VU#403150"
      },
      {
        "db": "CERT/CC",
        "id": "VU#783400"
      },
      {
        "db": "BID",
        "id": "25913"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-000686"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200710-059"
      },
      {
        "db": "NVD",
        "id": "CVE-2007-4673"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/a:mozilla:firefox",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:mozilla:seamonkey",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:apple:quicktime",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-000686"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "The vendor disclosed this issue.",
    "sources": [
      {
        "db": "BID",
        "id": "25913"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200710-059"
      }
    ],
    "trust": 0.9
  },
  "cve": "CVE-2007-4673",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "COMPLETE",
            "baseScore": 9.3,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 8.6,
            "id": "CVE-2007-4673",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 1.0,
            "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "Low",
            "accessVector": "Network",
            "authentication": "None",
            "author": "NVD",
            "availabilityImpact": "None",
            "baseScore": 5.0,
            "confidentialityImpact": "None",
            "exploitabilityScore": null,
            "id": "CVE-2007-4673",
            "impactScore": null,
            "integrityImpact": "Partial",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "Medium",
            "trust": 0.8,
            "userInteractionRequired": null,
            "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
            "version": "2.0"
          },
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "COMPLETE",
            "baseScore": 9.3,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 8.6,
            "id": "VHN-28035",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 0.1,
            "vectorString": "AV:N/AC:M/AU:N/C:C/I:C/A:C",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2007-4673",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "CARNEGIE MELLON",
            "id": "VU#751808",
            "trust": 0.8,
            "value": "35.11"
          },
          {
            "author": "CARNEGIE MELLON",
            "id": "VU#403150",
            "trust": 0.8,
            "value": "18.43"
          },
          {
            "author": "CARNEGIE MELLON",
            "id": "VU#783400",
            "trust": 0.8,
            "value": "25.52"
          },
          {
            "author": "NVD",
            "id": "CVE-2007-4673",
            "trust": 0.8,
            "value": "Medium"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-200710-059",
            "trust": 0.6,
            "value": "CRITICAL"
          },
          {
            "author": "VULHUB",
            "id": "VHN-28035",
            "trust": 0.1,
            "value": "HIGH"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#751808"
      },
      {
        "db": "CERT/CC",
        "id": "VU#403150"
      },
      {
        "db": "CERT/CC",
        "id": "VU#783400"
      },
      {
        "db": "VULHUB",
        "id": "VHN-28035"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-000686"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200710-059"
      },
      {
        "db": "NVD",
        "id": "CVE-2007-4673"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Argument injection vulnerability in Apple QuickTime 7.2 for Windows XP SP2 and Vista allows remote attackers to execute arbitrary commands via a URL in the qtnext field in a crafted QTL file.  NOTE: this issue may be related to CVE-2006-4965 or CVE-2007-5045. Mozilla Firefox does not filter input when sending certain URIs to registered protocol handlers. This may allow a remote, authenticated attacker to use Firefox as a vector for executing commands on a vulnerable system. Apple QuickTime Is Windows And Apple OS X Is a media player that supports. Also, Internet Explorer And Safari , Netscape A compatible browser plug-in is also provided. Web The page creator Web In the page QuickTime Movie When incorporating QuickTime link (.qtl) You can specify parameters for starting an application using a file. One of the parameters that can be specified qtnext Is used to specify the location of multimedia files to import and play. this qtnext A vulnerability exists that allows arbitrary commands to be executed using parameters. QuickTime for Windows is prone to a remote code-execution vulnerability because the application fails to handle URIs securely . \nSuccessfully exploiting this issue allows remote attackers to execute arbitrary applications with controlled command-line arguments. This facilitates the remote compromise of affected computers. \nQuickTime 7.2 running on Microsoft Windows Vista or XP SP2 is vulnerable. \n\n----------------------------------------------------------------------\n\nBETA test the new Secunia Personal Software Inspector!\n\nThe Secunia PSI detects installed software on your computer and\ncategorises it as either Insecure, End-of-Life, or Up-To-Date. \nEffectively enabling you to focus your attention on software\ninstallations where more secure versions are available from the\nvendors. \n\nThe security issue is caused due to the \"-chrome\" parameter allowing\nexecution of arbitrary Javascript script code in chrome context. \nvia applications invoking Firefox with unfiltered command line\narguments. \n\nThis is related to:\nSA22048\nSA25984\n\nThe security issue affects Firefox prior to version 2.0.0.7. \n\nSOLUTION:\nUpdate to version 2.0.0.7. \n\nNOTE: Support for Firefox 1.5.0.x has ended June 2007. The vendor\nencourages users to upgrade to Firefox 2. \n\n----------------------------------------------------------------------\n\nTry a new way to discover vulnerabilities that ALREADY EXIST in your\nIT infrastructure. \n\nThe Full Featured Secunia Network Software Inspector (NSI) is now\navailable:\nhttp://secunia.com/network_software_inspector/\n\nThe Secunia NSI enables you to INSPECT, DISCOVER, and DOCUMENT\nvulnerabilities in more than 4,000 different Windows applications. \n\nThe vulnerability is caused due to an input validation error within\nthe handling of system default URIs with registered URI handlers\n(e.g. \"mailto\", \"news\", \"nntp\", \"snews\", \"telnet\"). using\nFirefox visits a malicious website with a specially crafted \"mailto\"\nURI containing a \"%\" character and ends in a certain extension (e.g. \n\".bat\", \".cmd\")\n\nExamples:\nmailto:test%../../../../windows/system32/calc.exe\".cmd\nnntp:../../../../../Windows/system32/telnet.exe\" \"secunia.com\n80%.bat\n\nSuccessful exploitation requires that Internet Explorer 7 is\ninstalled on the system. Other versions and browsers may\nalso be affected. \n\nSOLUTION:\nDo not browse untrusted websites or follow untrusted links. \n\nPROVIDED AND/OR DISCOVERED BY:\nVulnerability discovered by:\n* Billy (BK) Rios\n\nFirefox not escaping quotes originally discussed by:\n* Jesper Johansson\n\nAdditional research by Secunia Research. \n\nORIGINAL ADVISORY:\nBilly (BK) Rios:\nhttp://xs-sniper.com/blog/2007/07/24/remote-command-execution-in-firefox-2005/\n\nOTHER REFERENCES:\nUS-CERT VU#783400:\nhttp://www.kb.cert.org/vuls/id/783400\n\nJesper Johansson blog:\nhttp://msinfluentials.com/blogs/jesper/archive/2007/07/20/hey-mozilla-quotes-are-not-legal-in-a-url.aspx\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n. \n-----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\n\tNational Cyber Alert System\n   Technical Cyber Security Alert TA07-297B\n\n\nAdobe Updates for Microsoft Windows URI Vulnerability\n\n   Original release date: October 24, 2007\n   Last revised: --\n   Source: US-CERT\n\nSystems Affected\n\n   Microsoft Windows XP and Windows Server 2003 systems with Internet\n   Explorer 7 and any of the following Adobe products:\n     * Adobe Reader 8.1 and earlier\n     * Adobe Acrobat Professional, 3D, and Standard 8.1 and earlier\n     * Adobe Reader 7.0.9 and earlier\n     * Adobe Acrobat Professional, 3D, Standard, and Elements 7.0.9 and\n       earlier\n\nOverview\n\n   Adobe has released updates for the Adobe Reader and Adobe Acrobat\n   product families. The update addresses a URI handling vulnerability in\n   Microsoft Windows XP and Server 2003 systems with Internet Explorer 7. \n\nI. Description\n\n   Installing Microsoft Internet Explorer (IE) 7 on Windows XP or Server\n   2003 changes the way Windows handles Uniform Resource Identifiers\n   (URIs). This change has introduced a flaw that can cause Windows to\n   incorrectly determine the appropriate handler for the protocol\n   specified in a URI. More information about this vulnerability is available in\n   US-CERT Vulnerability Note VU#403150. \n\n   Public reports indicate that this vulnerability is being actively\n   exploited with malicious PDF files. Adobe has released Adobe Reader\n   8.1.1 and Adobe Acrobat 8.1.1, which mitigate this vulnerability. \n\nII. \n\nIII. Solution\n\nApply an update\n\n   Adobe has released Adobe Reader 8.1.1 and Adobe Acrobat 8.1.1 to\n   address this issue. \n\nDisable the mailto: URI in Adobe Reader and Adobe Acrobat\n\n   If you are unable to install an updated version of the software, this\n   vulnerability can be mitigated by disabling the mailto: URI handler in\n   Adobe Reader and Adobe Acrobat. Please see Adobe Security Bulletin\n   APSB07-18 for details. \n\n\nAppendix A. Vendor Information\n\nAdobe\n\n   For information about updating affected Adobe products, see Adobe\n   Security Bulletin APSB07-18. \n\nAppendix B. References\n\n    * Adobe Security Bulletin APSB07-18 -\n      \u003chttp://www.adobe.com/support/security/bulletins/apsb07-18.htm\u003e\n     \n    * Microsoft Security Advisory (943521) -\n      \u003chttp://www.microsoft.com/technet/security/advisory/943521.mspx\u003e\n     \n    * US-CERT Vulnerability Note VU#403150 -\n      \u003chttp://www.kb.cert.org/vuls/id/403150\u003e\n\n _________________________________________________________________\n\n   The most recent version of this document can be found at:\n\n     \u003chttp://www.us-cert.gov/cas/techalerts/TA07-297B.html\u003e\n _________________________________________________________________\n\n   Feedback can be directed to US-CERT Technical Staff. Please send\n   email to \u003ccert@cert.org\u003e with \"TA07-297B Feedback VU#403150\" in the\n   subject. \n _________________________________________________________________\n    \n   For instructions on subscribing to or unsubscribing from this\n   mailing list, visit \u003chttp://www.us-cert.gov/cas/signup.html\u003e. \n _________________________________________________________________\n\n   Produced 2007 by US-CERT, a government organization. \n\n   Terms of use:\n\n     \u003chttp://www.us-cert.gov/legal.html\u003e\n _________________________________________________________________\n\nRevision History\n\n   October 24, 2007: Initial release\n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1.2.1 (GNU/Linux)\n\niQEVAwUBRx+8WPRFkHkM87XOAQIrOQf/USsBbfDmKZ4GCi8W2466mI+kZoEHoe/H\n3l3p4/1cuFGoPHFfeDLbG+alXiHSAdXoX7Db34InEUKMs7kRUVPEdW9LggI9VaTJ\nlKnZJxM3dXL+zPCWcDkNqrmmzyJuXwN5FmSXhlcnN4+FRzNrZYwDe1UcOk3q6m1s\nVNPIBTrqfSuFRllNt+chV1vQ876LLweS+Xh1DIQ/VIyduqvTogoYZO4p2A0YJD57\n4y0obNuk+IhgzyhZHtSsR0ql7rGrFr4S97XUQGbKOAZWcDzNGiXJ5FkrMTaP25OI\nLazBVDofVz8ydUcEkb4belgv5REpfYUJc9hRbRZ+IpbAay2j42m8NQ==\n=PgB9\n-----END PGP SIGNATURE-----\n. \n\n----------------------------------------------------------------------\n\nWant to work within IT-Security?\n\nSecunia is expanding its team of highly skilled security experts. \nWe will help with relocation and obtaining a work permit. \n\nInternet web sites are normally not allowed to link to local\nresources. It is, however, possible by a malicious web site to open\nlocal content in the browser via the \"qtnext\" attribute of the\n\"embed\" tag in a Quicktime Media Link file opened by the QuickTime\nPlug-In. \n\nNOTE: This does not pose any direct security impact by itself, but\nmay be exploited in combination with other vulnerabilities",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2007-4673"
      },
      {
        "db": "CERT/CC",
        "id": "VU#751808"
      },
      {
        "db": "CERT/CC",
        "id": "VU#403150"
      },
      {
        "db": "CERT/CC",
        "id": "VU#783400"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-000686"
      },
      {
        "db": "BID",
        "id": "25913"
      },
      {
        "db": "VULHUB",
        "id": "VHN-28035"
      },
      {
        "db": "PACKETSTORM",
        "id": "59433"
      },
      {
        "db": "PACKETSTORM",
        "id": "58068"
      },
      {
        "db": "PACKETSTORM",
        "id": "60418"
      },
      {
        "db": "PACKETSTORM",
        "id": "50213"
      }
    ],
    "trust": 4.5
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2007-4673",
        "trust": 2.8
      },
      {
        "db": "BID",
        "id": "25913",
        "trust": 2.0
      },
      {
        "db": "SECUNIA",
        "id": "26201",
        "trust": 1.8
      },
      {
        "db": "OSVDB",
        "id": "40434",
        "trust": 1.7
      },
      {
        "db": "CERT/CC",
        "id": "VU#751808",
        "trust": 1.6
      },
      {
        "db": "SECUNIA",
        "id": "26881",
        "trust": 0.9
      },
      {
        "db": "CERT/CC",
        "id": "VU#403150",
        "trust": 0.9
      },
      {
        "db": "CERT/CC",
        "id": "VU#783400",
        "trust": 0.9
      },
      {
        "db": "SECUNIA",
        "id": "22048",
        "trust": 0.9
      },
      {
        "db": "BID",
        "id": "20138",
        "trust": 0.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-000686",
        "trust": 0.8
      },
      {
        "db": "APPLE",
        "id": "APPLE-SA-2007-10-03",
        "trust": 0.6
      },
      {
        "db": "XF",
        "id": "36937",
        "trust": 0.6
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200710-059",
        "trust": 0.6
      },
      {
        "db": "VULHUB",
        "id": "VHN-28035",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "59433",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "58068",
        "trust": 0.1
      },
      {
        "db": "USCERT",
        "id": "TA07-297B",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "60418",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "50213",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#751808"
      },
      {
        "db": "CERT/CC",
        "id": "VU#403150"
      },
      {
        "db": "CERT/CC",
        "id": "VU#783400"
      },
      {
        "db": "VULHUB",
        "id": "VHN-28035"
      },
      {
        "db": "BID",
        "id": "25913"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-000686"
      },
      {
        "db": "PACKETSTORM",
        "id": "59433"
      },
      {
        "db": "PACKETSTORM",
        "id": "58068"
      },
      {
        "db": "PACKETSTORM",
        "id": "60418"
      },
      {
        "db": "PACKETSTORM",
        "id": "50213"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200710-059"
      },
      {
        "db": "NVD",
        "id": "CVE-2007-4673"
      }
    ]
  },
  "id": "VAR-200710-0520",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-28035"
      }
    ],
    "trust": 0.01
  },
  "last_update_date": "2024-11-23T21:10:07.406000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "QuickTime 7.2 for Windows",
        "trust": 0.8,
        "url": "http://www.apple.com/support/downloads/securityupdateforquicktime72forwindows.html"
      },
      {
        "title": "Top Page",
        "trust": 0.8,
        "url": "http://www.apple.com/jp/quicktime/"
      },
      {
        "title": "Security Update for QuickTime 7.2 for Windows",
        "trust": 0.8,
        "url": "http://docs.info.apple.com/article.html?artnum=306560-en"
      },
      {
        "title": "Security Update for QuickTime 7.2 for Windows",
        "trust": 0.8,
        "url": "http://docs.info.apple.com/article.html?artnum=306560-ja"
      },
      {
        "title": "mfsa2007-28",
        "trust": 0.8,
        "url": "http://www.mozilla.org/security/announce/2007/mfsa2007-28.html"
      },
      {
        "title": "mfsa2007-28",
        "trust": 0.8,
        "url": "http://www.mozilla-japan.org/security/announce/2007/mfsa2007-28.html"
      },
      {
        "title": "QuickTime 7.2 for Windows",
        "trust": 0.8,
        "url": "http://www.apple.com/jp/ftp-info/reference/securityupdateforquicktime72forwindows.html"
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-000686"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-78",
        "trust": 1.9
      },
      {
        "problemtype": "CWE-94",
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-28035"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-000686"
      },
      {
        "db": "NVD",
        "id": "CVE-2007-4673"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.8,
        "url": "http://docs.info.apple.com/article.html?artnum=306560"
      },
      {
        "trust": 2.4,
        "url": "http://support.microsoft.com/kb/224816"
      },
      {
        "trust": 1.7,
        "url": "http://xs-sniper.com/blog/2007/07/24/remote-command-execution-in-firefox-2005/"
      },
      {
        "trust": 1.7,
        "url": "http://secunia.com/advisories/26201/"
      },
      {
        "trust": 1.7,
        "url": "http://lists.apple.com/archives/security-announce/2007/oct/msg00000.html"
      },
      {
        "trust": 1.7,
        "url": "http://www.securityfocus.com/bid/25913"
      },
      {
        "trust": 1.7,
        "url": "http://osvdb.org/40434"
      },
      {
        "trust": 1.6,
        "url": "http://xs-sniper.com/blog/remote-command-exec-firefox-2005/"
      },
      {
        "trust": 1.6,
        "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=389580"
      },
      {
        "trust": 1.6,
        "url": "http://kb.mozillazine.org/firefox_:_faqs_:_about:config_entries"
      },
      {
        "trust": 1.6,
        "url": "http://en.wikipedia.org/wiki/uniform_resource_identifier"
      },
      {
        "trust": 1.1,
        "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36937"
      },
      {
        "trust": 0.9,
        "url": "http://www.mozilla.org/security/announce/2007/mfsa2007-28.html"
      },
      {
        "trust": 0.9,
        "url": "http://secunia.com/advisories/26881/"
      },
      {
        "trust": 0.8,
        "url": "http://www.gnucitizen.org/blog/0day-quicktime-pwns-firefox"
      },
      {
        "trust": 0.8,
        "url": "http://blog.mozilla.com/security/2007/09/18/firefox-2.0.0.7-now-available/"
      },
      {
        "trust": 0.8,
        "url": "http://docs.info.apple.com/article.html?artnum=305149"
      },
      {
        "trust": 0.8,
        "url": "http://developer.apple.com/quicktime/quicktimeintro/tools/embed2.html"
      },
      {
        "trust": 0.8,
        "url": "http://noscript.net/features#contentblocking"
      },
      {
        "trust": 0.8,
        "url": "http://noscript.net"
      },
      {
        "trust": 0.8,
        "url": "http://msdn2.microsoft.com/en-us/library/ms647732.aspx"
      },
      {
        "trust": 0.8,
        "url": "http://www.microsoft.com/technet/security/bulletin/ms07-061.mspx"
      },
      {
        "trust": 0.8,
        "url": "http://www.microsoft.com/technet/security/advisory/943521.mspx"
      },
      {
        "trust": 0.8,
        "url": "http://blogs.technet.com/msrc/archive/2007/10/25/msrc-blog-october-25th-update-to-security-advisory-943521.aspx"
      },
      {
        "trust": 0.8,
        "url": "http://www.adobe.com/support/security/advisories/apsa07-04.html"
      },
      {
        "trust": 0.8,
        "url": "http://www.adobe.com/support/security/bulletins/apsb07-18.html"
      },
      {
        "trust": 0.8,
        "url": "http://en-us.www.mozilla.com/en-us/firefox/2.0.0.6/releasenotes/"
      },
      {
        "trust": 0.8,
        "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=389106"
      },
      {
        "trust": 0.8,
        "url": "http://www.w3schools.com/tags/ref_urlencode.asp"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-4673"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-4965"
      },
      {
        "trust": 0.8,
        "url": "http://www.frsirt.com/english/advisories/2007/3155"
      },
      {
        "trust": 0.8,
        "url": "http://jvn.jp/cert/jvnvu%23751808/index.html"
      },
      {
        "trust": 0.8,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2007-4673"
      },
      {
        "trust": 0.8,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2006-4965"
      },
      {
        "trust": 0.8,
        "url": "http://secunia.com/advisories/22048"
      },
      {
        "trust": 0.8,
        "url": "http://www.securityfocus.com/bid/20138"
      },
      {
        "trust": 0.8,
        "url": "http://www.securitytracker.com/id?1018687"
      },
      {
        "trust": 0.8,
        "url": "http://www.kb.cert.org/vuls/id/751808"
      },
      {
        "trust": 0.8,
        "url": "http://www.cyberpolice.go.jp/important/2007/20071005_152642.html"
      },
      {
        "trust": 0.6,
        "url": "http://xforce.iss.net/xforce/xfdb/36937"
      },
      {
        "trust": 0.3,
        "url": "http://www.apple.com/quicktime/"
      },
      {
        "trust": 0.3,
        "url": "http://secunia.com/secunia_security_advisories/"
      },
      {
        "trust": 0.3,
        "url": "http://secunia.com/about_secunia_advisories/"
      },
      {
        "trust": 0.3,
        "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org"
      },
      {
        "trust": 0.2,
        "url": "http://secunia.com/advisories/22048/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/product/4227/"
      },
      {
        "trust": 0.1,
        "url": "https://psi.secunia.com/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/product/12434/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/25984/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/product/1173/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/product/22/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/network_software_inspector/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/product/1174/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/product/1176/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/product/1175/"
      },
      {
        "trust": 0.1,
        "url": "http://www.kb.cert.org/vuls/id/783400"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/product/16/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/product/12366/"
      },
      {
        "trust": 0.1,
        "url": "http://msinfluentials.com/blogs/jesper/archive/2007/07/20/hey-mozilla-quotes-are-not-legal-in-a-url.aspx"
      },
      {
        "trust": 0.1,
        "url": "http://www.adobe.com/support/security/bulletins/apsb07-18.htm\u003e"
      },
      {
        "trust": 0.1,
        "url": "http://www.microsoft.com/technet/security/advisory/943521.mspx\u003e"
      },
      {
        "trust": 0.1,
        "url": "http://www.kb.cert.org/vuls/id/403150\u003e"
      },
      {
        "trust": 0.1,
        "url": "http://www.us-cert.gov/cas/signup.html\u003e."
      },
      {
        "trust": 0.1,
        "url": "http://www.us-cert.gov/legal.html\u003e"
      },
      {
        "trust": 0.1,
        "url": "http://www.us-cert.gov/cas/techalerts/ta07-297b.html\u003e"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/product/5090/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/quality_assurance_analyst/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/hardcore_disassembler_and_reverse_engineer/"
      },
      {
        "trust": 0.1,
        "url": "http://www.gnucitizen.org/blog/backdooring-mp3-files/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/web_application_security_specialist/"
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#751808"
      },
      {
        "db": "CERT/CC",
        "id": "VU#403150"
      },
      {
        "db": "CERT/CC",
        "id": "VU#783400"
      },
      {
        "db": "VULHUB",
        "id": "VHN-28035"
      },
      {
        "db": "BID",
        "id": "25913"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-000686"
      },
      {
        "db": "PACKETSTORM",
        "id": "59433"
      },
      {
        "db": "PACKETSTORM",
        "id": "58068"
      },
      {
        "db": "PACKETSTORM",
        "id": "60418"
      },
      {
        "db": "PACKETSTORM",
        "id": "50213"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200710-059"
      },
      {
        "db": "NVD",
        "id": "CVE-2007-4673"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "CERT/CC",
        "id": "VU#751808"
      },
      {
        "db": "CERT/CC",
        "id": "VU#403150"
      },
      {
        "db": "CERT/CC",
        "id": "VU#783400"
      },
      {
        "db": "VULHUB",
        "id": "VHN-28035"
      },
      {
        "db": "BID",
        "id": "25913"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-000686"
      },
      {
        "db": "PACKETSTORM",
        "id": "59433"
      },
      {
        "db": "PACKETSTORM",
        "id": "58068"
      },
      {
        "db": "PACKETSTORM",
        "id": "60418"
      },
      {
        "db": "PACKETSTORM",
        "id": "50213"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200710-059"
      },
      {
        "db": "NVD",
        "id": "CVE-2007-4673"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2007-09-13T00:00:00",
        "db": "CERT/CC",
        "id": "VU#751808"
      },
      {
        "date": "2007-07-27T00:00:00",
        "db": "CERT/CC",
        "id": "VU#403150"
      },
      {
        "date": "2007-07-26T00:00:00",
        "db": "CERT/CC",
        "id": "VU#783400"
      },
      {
        "date": "2007-10-04T00:00:00",
        "db": "VULHUB",
        "id": "VHN-28035"
      },
      {
        "date": "2007-10-03T00:00:00",
        "db": "BID",
        "id": "25913"
      },
      {
        "date": "2007-09-25T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2007-000686"
      },
      {
        "date": "2007-09-20T08:11:10",
        "db": "PACKETSTORM",
        "id": "59433"
      },
      {
        "date": "2007-07-27T03:17:23",
        "db": "PACKETSTORM",
        "id": "58068"
      },
      {
        "date": "2007-10-25T04:18:19",
        "db": "PACKETSTORM",
        "id": "60418"
      },
      {
        "date": "2006-09-21T23:56:25",
        "db": "PACKETSTORM",
        "id": "50213"
      },
      {
        "date": "2007-10-04T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200710-059"
      },
      {
        "date": "2007-10-04T23:17:00",
        "db": "NVD",
        "id": "CVE-2007-4673"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2007-10-04T00:00:00",
        "db": "CERT/CC",
        "id": "VU#751808"
      },
      {
        "date": "2007-11-13T00:00:00",
        "db": "CERT/CC",
        "id": "VU#403150"
      },
      {
        "date": "2007-07-31T00:00:00",
        "db": "CERT/CC",
        "id": "VU#783400"
      },
      {
        "date": "2017-07-29T00:00:00",
        "db": "VULHUB",
        "id": "VHN-28035"
      },
      {
        "date": "2007-10-04T05:58:00",
        "db": "BID",
        "id": "25913"
      },
      {
        "date": "2007-10-17T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2007-000686"
      },
      {
        "date": "2007-10-11T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200710-059"
      },
      {
        "date": "2024-11-21T00:36:10.250000",
        "db": "NVD",
        "id": "CVE-2007-4673"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200710-059"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Apple QuickTime remote command execution vulnerability",
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#751808"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "operating system commend injection",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200710-059"
      }
    ],
    "trust": 0.6
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…