VAR-201508-0055

Vulnerability from variot - Updated: 2023-12-18 11:31

Apple QuickTime before 7.7.8 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted file, a different vulnerability than CVE-2015-5785. Apple QuickTime is prone to a remote memory-corruption vulnerability. Versions prior to QuickTime 7.7.8 running on Windows 7 and Windows Vista are vulnerable. Apple QuickTime is a multimedia playback software developed by Apple (Apple). The software is capable of handling multiple sources such as digital video, media segments, and more. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256

APPLE-SA-2015-08-20-1 QuickTime 7.7.8

QuickTime 7.7.8 is now available and addresses the following:

QuickTime Available for: Windows 7 and Windows Vista Impact: Processing a maliciously crafted file may lead to an unexpected application termination or arbitrary code execution Description: Multiple memory corruption issues existed in QuickTime. These issues were addressed through improved memory handling. CVE-ID CVE-2015-3788 : Ryan Pentney and Richard Johnson of Cisco Talos CVE-2015-3789 : Ryan Pentney and Richard Johnson of Cisco Talos CVE-2015-3790 : Ryan Pentney and Richard Johnson of Cisco Talos CVE-2015-3791 : Ryan Pentney and Richard Johnson of Cisco Talos CVE-2015-3792 : Ryan Pentney and Richard Johnson of Cisco Talos CVE-2015-5751 : WalkerFuz CVE-2015-5779 : Apple CVE-2015-5785 : Fortinet's FortiGuard Labs CVE-2015-5786 : Ryan Pentney and Richard Johnson of Cisco Talos

QuickTime 7.7.8 may be obtained from the QuickTime Downloads site: http://www.apple.com/quicktime/download/

You may also update to the latest version of QuickTime via Apple Software Update, which can be found in the Start menu.

Information will also be posted to the Apple Security Updates web site: https://support.apple.com/kb/HT201222

This message is signed with Apple's Product Security PGP key, and details are available at: https://www.apple.com/support/security/pgp/

-----BEGIN PGP SIGNATURE----- Comment: GPGTools - http://gpgtools.org

iQIcBAEBCAAGBQJV1jY/AAoJEBcWfLTuOo7tr4kQAImgsVXAO5Ad2RAPUiBiEHND 4rIQh9GAl3g2OOacqLk752+pz/CSHZYA1X1fKXHCqF7ynfHSQjC656e6f13RI3qP /jGpG3YshNiCYhAZ7ZloweX4DvwFNXw8s/YU689XPRsiEevExYnQWRY5xUmlcJ53 PquSAgoMpLFUwE2fl0wkCNObfKYaq+qSnaKkzo9B/qPlk9k+eqs4FI6/6GCNnekk TYtniCc66kswfcl2BjQdjEXzEIINSHSO0wRceRCIM0zxGhOP4oTB6pls3D7PJZND DgN9PZsT7DHj/N6gfAYxwm8/mBuVjeRYyL9Jg0T4VLWt3CQimrnTdQOylXBbHmOJ 9mdHaxPDyd3BmkGgHyDDkClGVU7j0zBBrRLYWA+YSlp1kZY0L8zkkneeYLn33/H1 1eRhJxaDVsFunxim8t9fnMrwwDv7a5vMTVBw0TzAfSqt2opKn+gT/KMkyBQyMexd PZmROYxLi8SaA0JOP7WIrHBzpUYu3PezagUV+cyYZeX7/Pt44cZabNHLevVjtMw1 8IHdyvZl9h1TA9RtYhb/Btb88aj7udd2TXlT9IF88DYvlNraQOVj5xKMhQLR7G0V F0rU+KN9e4Xon8KfVg/qWwe8bv63NlvMRBg7x/uy3pRxXTpo3h+Kyc8GOuiEXx4J 7RGEq7KIofT9es1sfO5u =ThbL -----END PGP SIGNATURE-----

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201508-0055",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "quicktime",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "apple",
        "version": "7.7.7"
      },
      {
        "model": "quicktime",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "apple",
        "version": "7.7.7"
      },
      {
        "model": "quicktime",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "apple",
        "version": "7.7.8   (windows 7/windows vista)"
      },
      {
        "model": "quicktime",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "7.9.1"
      },
      {
        "model": "quicktime",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "7.6"
      },
      {
        "model": "quicktime",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "7.3.4"
      },
      {
        "model": "quicktime",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "7.7.5"
      },
      {
        "model": "quicktime",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "7.2"
      },
      {
        "model": "quicktime",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "7"
      },
      {
        "model": "quicktime",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "apple",
        "version": "7.7.8"
      }
    ],
    "sources": [
      {
        "db": "BID",
        "id": "76444"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-004430"
      },
      {
        "db": "NVD",
        "id": "CVE-2015-5786"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201508-502"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:a:apple:quicktime:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "versionEndIncluding": "7.7.7",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2015-5786"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Ryan Pentney and Richard Johnson of Cisco Talos.",
    "sources": [
      {
        "db": "BID",
        "id": "76444"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201508-502"
      }
    ],
    "trust": 0.9
  },
  "cve": "CVE-2015-5786",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "acInsufInfo": false,
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "NVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.8,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 8.6,
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "obtainAllPrivilege": false,
            "obtainOtherPrivilege": false,
            "obtainUserPrivilege": false,
            "severity": "MEDIUM",
            "trust": 1.0,
            "userInteractionRequired": true,
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "Medium",
            "accessVector": "Network",
            "authentication": "None",
            "author": "NVD",
            "availabilityImpact": "Partial",
            "baseScore": 6.8,
            "confidentialityImpact": "Partial",
            "exploitabilityScore": null,
            "id": "CVE-2015-5786",
            "impactScore": null,
            "integrityImpact": "Partial",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "Medium",
            "trust": 0.8,
            "userInteractionRequired": null,
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.8,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 8.6,
            "id": "VHN-83747",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.1,
            "vectorString": "AV:N/AC:M/AU:N/C:P/I:P/A:P",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "NVD",
            "id": "CVE-2015-5786",
            "trust": 1.8,
            "value": "MEDIUM"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201508-502",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "VULHUB",
            "id": "VHN-83747",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-83747"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-004430"
      },
      {
        "db": "NVD",
        "id": "CVE-2015-5786"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201508-502"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Apple QuickTime before 7.7.8 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted file, a different vulnerability than CVE-2015-5785. Apple QuickTime is prone to a remote memory-corruption vulnerability. \nVersions prior to QuickTime 7.7.8 running on Windows 7 and Windows Vista are vulnerable. Apple QuickTime is a multimedia playback software developed by Apple (Apple). The software is capable of handling multiple sources such as digital video, media segments, and more. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA256\n\nAPPLE-SA-2015-08-20-1 QuickTime 7.7.8\n\nQuickTime 7.7.8 is now available and addresses the following:\n\nQuickTime\nAvailable for: Windows 7 and Windows Vista\nImpact: Processing a maliciously crafted file may lead to an\nunexpected application termination or arbitrary code execution\nDescription: Multiple memory corruption issues existed in QuickTime. \nThese issues were addressed through improved memory handling. \nCVE-ID\nCVE-2015-3788 : Ryan Pentney and Richard Johnson of Cisco Talos\nCVE-2015-3789 : Ryan Pentney and Richard Johnson of Cisco Talos\nCVE-2015-3790 : Ryan Pentney and Richard Johnson of Cisco Talos\nCVE-2015-3791 : Ryan Pentney and Richard Johnson of Cisco Talos\nCVE-2015-3792 : Ryan Pentney and Richard Johnson of Cisco Talos\nCVE-2015-5751 : WalkerFuz\nCVE-2015-5779 : Apple\nCVE-2015-5785 : Fortinet\u0027s FortiGuard Labs\nCVE-2015-5786 : Ryan Pentney and Richard Johnson of Cisco Talos\n\n\nQuickTime 7.7.8 may be obtained from the QuickTime Downloads site:\nhttp://www.apple.com/quicktime/download/\n\nYou may also update to the latest version of QuickTime via Apple\nSoftware Update, which can be found in the Start menu. \n\nInformation will also be posted to the Apple Security Updates\nweb site: https://support.apple.com/kb/HT201222\n\nThis message is signed with Apple\u0027s Product Security PGP key,\nand details are available at:\nhttps://www.apple.com/support/security/pgp/\n\n-----BEGIN PGP SIGNATURE-----\nComment: GPGTools - http://gpgtools.org\n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\n7RGEq7KIofT9es1sfO5u\n=ThbL\n-----END PGP SIGNATURE-----\n",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2015-5786"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-004430"
      },
      {
        "db": "BID",
        "id": "76444"
      },
      {
        "db": "VULHUB",
        "id": "VHN-83747"
      },
      {
        "db": "PACKETSTORM",
        "id": "133268"
      }
    ],
    "trust": 2.07
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2015-5786",
        "trust": 2.9
      },
      {
        "db": "SECTRACK",
        "id": "1033346",
        "trust": 1.1
      },
      {
        "db": "BID",
        "id": "76444",
        "trust": 1.0
      },
      {
        "db": "JVN",
        "id": "JVNVU94440136",
        "trust": 0.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-004430",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201508-502",
        "trust": 0.7
      },
      {
        "db": "VULHUB",
        "id": "VHN-83747",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "133268",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-83747"
      },
      {
        "db": "BID",
        "id": "76444"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-004430"
      },
      {
        "db": "PACKETSTORM",
        "id": "133268"
      },
      {
        "db": "NVD",
        "id": "CVE-2015-5786"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201508-502"
      }
    ]
  },
  "id": "VAR-201508-0055",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-83747"
      }
    ],
    "trust": 0.01
  },
  "last_update_date": "2023-12-18T11:31:01.075000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "Apple security updates",
        "trust": 0.8,
        "url": "https://support.apple.com/en-us/ht201222"
      },
      {
        "title": "APPLE-SA-2015-08-20-1 QuickTime 7.7.8",
        "trust": 0.8,
        "url": "http://lists.apple.com/archives/security-announce/2015/aug/msg00004.html"
      },
      {
        "title": "HT205046",
        "trust": 0.8,
        "url": "http://support.apple.com/en-us/ht205046"
      },
      {
        "title": "HT205046",
        "trust": 0.8,
        "url": "https://support.apple.com/ja-jp/ht205046"
      },
      {
        "title": "QuickTime-7.7.8",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=57420"
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-004430"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201508-502"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-119",
        "trust": 1.9
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-83747"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-004430"
      },
      {
        "db": "NVD",
        "id": "CVE-2015-5786"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 1.7,
        "url": "http://lists.apple.com/archives/security-announce/2015/aug/msg00004.html"
      },
      {
        "trust": 1.7,
        "url": "https://support.apple.com/ht205046"
      },
      {
        "trust": 1.1,
        "url": "http://www.securitytracker.com/id/1033346"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-5786"
      },
      {
        "trust": 0.8,
        "url": "http://jvn.jp/vu/jvnvu94440136/index.html"
      },
      {
        "trust": 0.8,
        "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-5786"
      },
      {
        "trust": 0.6,
        "url": "http://www.securityfocus.com/bid/76444"
      },
      {
        "trust": 0.3,
        "url": "http://www.apple.com/quicktime/"
      },
      {
        "trust": 0.3,
        "url": "https://support.apple.com/en-in/ht205046"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2015-3790"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2015-3792"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2015-3788"
      },
      {
        "trust": 0.1,
        "url": "http://www.apple.com/quicktime/download/"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2015-3791"
      },
      {
        "trust": 0.1,
        "url": "https://support.apple.com/kb/ht201222"
      },
      {
        "trust": 0.1,
        "url": "https://www.apple.com/support/security/pgp/"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2015-5785"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2015-5779"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2015-5751"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2015-5786"
      },
      {
        "trust": 0.1,
        "url": "http://gpgtools.org"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2015-3789"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-83747"
      },
      {
        "db": "BID",
        "id": "76444"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-004430"
      },
      {
        "db": "PACKETSTORM",
        "id": "133268"
      },
      {
        "db": "NVD",
        "id": "CVE-2015-5786"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201508-502"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "VULHUB",
        "id": "VHN-83747"
      },
      {
        "db": "BID",
        "id": "76444"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-004430"
      },
      {
        "db": "PACKETSTORM",
        "id": "133268"
      },
      {
        "db": "NVD",
        "id": "CVE-2015-5786"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201508-502"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2015-08-25T00:00:00",
        "db": "VULHUB",
        "id": "VHN-83747"
      },
      {
        "date": "2015-08-20T00:00:00",
        "db": "BID",
        "id": "76444"
      },
      {
        "date": "2015-08-26T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2015-004430"
      },
      {
        "date": "2015-08-23T20:06:35",
        "db": "PACKETSTORM",
        "id": "133268"
      },
      {
        "date": "2015-08-25T01:59:09.820000",
        "db": "NVD",
        "id": "CVE-2015-5786"
      },
      {
        "date": "2015-08-24T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201508-502"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2016-12-24T00:00:00",
        "db": "VULHUB",
        "id": "VHN-83747"
      },
      {
        "date": "2015-08-20T00:00:00",
        "db": "BID",
        "id": "76444"
      },
      {
        "date": "2015-08-26T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2015-004430"
      },
      {
        "date": "2016-12-24T02:59:30.763000",
        "db": "NVD",
        "id": "CVE-2015-5786"
      },
      {
        "date": "2015-08-27T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201508-502"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201508-502"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Apple QuickTime Vulnerable to arbitrary code execution",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-004430"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "buffer overflow",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201508-502"
      }
    ],
    "trust": 0.6
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…