Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
apple quicktime 4.1.2 vulnerabilities and exploits
(subscribe to this query)
7.6
CVSSv2
CVE-2001-0198
Buffer overflow in QuickTime Player plugin 4.1.2 (Japanese) allows remote malicious users to execute arbitrary commands via a long HREF parameter in an EMBED tag.
Apple Quicktime 4.1.2
1 EDB exploit
5
CVSSv2
CVE-2003-0051
parse_xml.cgi in Apple Darwin Streaming Administration Server 4.1.2 and QuickTime Streaming Server 4.1.1 allows remote malicious users to obtain the physical path of the server's installation path via a NULL file parameter.
Apple Darwin Streaming Server 4.1.2
Apple Quicktime Streaming Server 4.1.1
5
CVSSv2
CVE-2003-0052
parse_xml.cgi in Apple Darwin Streaming Administration Server 4.1.2 and QuickTime Streaming Server 4.1.1 allows remote malicious users to list arbitrary directories.
Apple Darwin Streaming Server 4.1.2
Apple Quicktime Streaming Server 4.1.1
7.5
CVSSv2
CVE-2003-0050
parse_xml.cgi in Apple Darwin Streaming Administration Server 4.1.2 and QuickTime Streaming Server 4.1.1 allows remote malicious users to execute arbitrary code via shell metacharacters.
Apple Darwin Streaming Server 4.1.2
Apple Quicktime Streaming Server 4.1.1
1 EDB exploit
4.3
CVSSv2
CVE-2003-0053
Cross-site scripting (XSS) vulnerability in parse_xml.cgi in Apple Darwin Streaming Administration Server 4.1.2 and QuickTime Streaming Server 4.1.1 allows remote malicious users to insert arbitrary script via the filename parameter, which is inserted into an error message.
Apple Darwin Streaming Server 4.1.2
Apple Quicktime Streaming Server 4.1.1
4.3
CVSSv2
CVE-2003-1413
parse_xml.cgi in Apple Darwin Streaming Server 4.1.1 allows remote malicious users to determine the existence of arbitrary files by using ".." sequences in the filename parameter and comparing the resulting error messages.
Apple Darwin Streaming Server 4.1.2
Apple Quicktime Streaming Server 4.1.1
7.5
CVSSv2
CVE-2003-0054
Apple Darwin Streaming Administration Server 4.1.2 and QuickTime Streaming Server 4.1.1 allows remote malicious users to execute certain code via a request to port 7070 with the script in an argument to the rtsp DESCRIBE method, which is inserted into a log file and executed when...
Apple Darwin Streaming Server 4.1.2
Apple Quicktime Streaming Server 4.1.1
4.3
CVSSv2
CVE-2003-1414
Directory traversal vulnerability in parse_xml.cg Apple Darwin Streaming Server 4.1.2 and Apple Quicktime Streaming Server 4.1.1 allows remote malicious users to read arbitrary files via a ... (triple dot) in the filename parameter.
Apple Darwin Streaming Server 4.1.2
Apple Quicktime Streaming Server 4.1.1
1 EDB exploit
5.1
CVSSv2
CVE-2006-1453
Stack-based buffer overflow in Apple QuickTime prior to 7.1 allows remote malicious users to execute arbitrary code via a crafted QuickDraw PICT image format file containing malformed font information.
Apple Quicktime
Apple Quicktime 3.0
Apple Quicktime 4.1.2
Apple Quicktime 5.0
Apple Quicktime 5.0.1
Apple Quicktime 6.0
Apple Quicktime 6.0.1
Apple Quicktime 6.0.2
Apple Quicktime 6.1
Apple Quicktime 6.1.0
Apple Quicktime 6.1.1
Apple Quicktime 6.2.0
9.3
CVSSv2
CVE-2007-6166
Stack-based buffer overflow in Apple QuickTime prior to 7.3.1, as used in QuickTime Player on Windows XP and Safari on Mac OS X, allows remote Real Time Streaming Protocol (RTSP) servers to execute arbitrary code via an RTSP response with a long Content-Type header.
Apple Quicktime
Apple Quicktime -
Apple Quicktime 3.0
Apple Quicktime 4.1.2
Apple Quicktime 5.0
Apple Quicktime 5.0.1
Apple Quicktime 5.0.2
Apple Quicktime 6.0
Apple Quicktime 6.1
Apple Quicktime 6.5
Apple Quicktime 6.5.1
Apple Quicktime 6.5.2
8 EDB exploits
Preferred Score:
CVSSv3
CVSSv2
CVSSv3
CVSSv4
EPSS
VMScore
Recommendations:
unprivileged
privilege escalation
CVE-2024-57040
morning
CVE-2025-24801
CVE-2025-24813
CVE-2025-29930
CVE-2024-10442
smartos
CVE-2025-0694
cryptolib
mbconnect24
local users
Home
/
Search Results
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
NEXT »