Executive Summary
Informations | |||
---|---|---|---|
Name | CVE-2006-4965 | First vendor Publication | 2006-09-24 |
Vendor | Cve | Last vendor Modification | 2024-11-21 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:N/I:P/A:N) | |||
---|---|---|---|
Cvss Base Score | 5 | Attack Range | Network |
Cvss Impact Score | 2.9 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Apple QuickTime 7.1.3 Player and Plug-In allows remote attackers to execute arbitrary JavaScript code and possibly conduct other attacks via a QuickTime Media Link (QTL) file with an embed XML element and a qtnext parameter that identifies resources outside of the original domain. NOTE: as of 20070912, this issue has been demonstrated by using instances of Components.interfaces.nsILocalFile and Components.interfaces.nsIProcess to execute arbitrary local files within Firefox and possibly Internet Explorer. |
Original Source
Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4965 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-94 | Failure to Control Generation of Code ('Code Injection') |
CPE : Common Platform Enumeration
Type | Description | Count |
---|---|---|
Application | 1 |
OpenVAS Exploits
Date | Description |
---|---|
2009-10-10 | Name : SLES9: Security update for Mozilla File : nvt/sles9p5018527.nasl |
2009-01-28 | Name : SuSE Update for MozillaFirefox,mozilla,seamonkey SUSE-SA:2007:057 File : nvt/gb_suse_2007_057.nasl |
2008-09-04 | Name : FreeBSD Ports: firefox File : nvt/freebsd_firefox28.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
29064 | Apple QuickTime Plug-In .qtl File qtnext Field XCS |
Snort® IPS/IDS
Date | Description |
---|---|
2014-01-10 | Apple QuickTime Movie link file URI security bypass attempt RuleID : 9430 - Revision : 14 - Type : FILE-MULTIMEDIA |
2014-01-10 | Apple QuickTime Movie link scripting security bypass attempt RuleID : 9429 - Revision : 9 - Type : FILE-MULTIMEDIA |
2014-01-10 | Apple Quicktime Plug-In Security Bypass RuleID : 17290 - Revision : 7 - Type : WEB-CLIENT |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2007-12-13 | Name : The remote SuSE 10 host is missing a security-related patch. File : suse_MozillaFirefox-4570.nasl - Type : ACT_GATHER_INFO |
2007-10-26 | Name : The remote openSUSE host is missing a security update. File : suse_seamonkey-4596.nasl - Type : ACT_GATHER_INFO |
2007-10-25 | Name : The remote openSUSE host is missing a security update. File : suse_seamonkey-4594.nasl - Type : ACT_GATHER_INFO |
2007-10-24 | Name : The remote openSUSE host is missing a security update. File : suse_MozillaFirefox-4572.nasl - Type : ACT_GATHER_INFO |
2007-10-24 | Name : The remote openSUSE host is missing a security update. File : suse_MozillaFirefox-4574.nasl - Type : ACT_GATHER_INFO |
2007-09-24 | Name : The remote FreeBSD host is missing one or more security-related updates. File : freebsd_pkg_3ce8c7e266cf11dcb25f02e0185f8d72.nasl - Type : ACT_GATHER_INFO |
2007-09-20 | Name : The remote Windows host contains a web browser that may allow arbitrary code ... File : mozilla_firefox_2007.nasl - Type : ACT_GATHER_INFO |
2007-03-06 | Name : The remote Windows host contains an application that is prone to multiple att... File : quicktime_715.nasl - Type : ACT_GATHER_INFO |
Sources (Detail)
Alert History
Date | Informations |
---|---|
2024-11-28 23:19:25 |
|
2024-11-28 12:10:07 |
|
2021-05-04 12:04:38 |
|
2021-04-22 01:05:17 |
|
2020-05-23 00:18:27 |
|
2018-10-18 00:19:43 |
|
2016-04-26 15:07:06 |
|
2014-02-17 10:37:22 |
|
2014-01-19 21:23:34 |
|
2013-05-11 11:10:09 |
|