Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-4qhm-v7jj-gh6g

Опубликовано: 01 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Apple QuickTime before 7.5 uses the url.dll!FileProtocolHandler handler for unrecognized URIs in qt:next attributes within SMIL text in video files, which sends these URIs to explorer.exe and thereby allows remote attackers to execute arbitrary programs, as originally demonstrated by crafted file: URLs.

Apple QuickTime before 7.5 uses the url.dll!FileProtocolHandler handler for unrecognized URIs in qt:next attributes within SMIL text in video files, which sends these URIs to explorer.exe and thereby allows remote attackers to execute arbitrary programs, as originally demonstrated by crafted file: URLs.

EPSS

Процентиль: 93%
0.09415
Низкий

Дефекты

CWE-20

Связанные уязвимости

nvd
больше 17 лет назад

Apple QuickTime before 7.5 uses the url.dll!FileProtocolHandler handler for unrecognized URIs in qt:next attributes within SMIL text in video files, which sends these URIs to explorer.exe and thereby allows remote attackers to execute arbitrary programs, as originally demonstrated by crafted file: URLs.

EPSS

Процентиль: 93%
0.09415
Низкий

Дефекты

CWE-20