Apple QuickTime Information Disclosure and Multiple Code Execution Vulnerabilities

An attacker may exploit these issues by enticing a victim into visiting a malicious webpage or opening a maliciously crafted file.

A proof-of-concept exploit is available.


 

Privacy Statement
Copyright 2010, SecurityFocus