Apple QuickTime 7.1.3 Player and Plug-In allows remote attackers to execute arbitrary JavaScript code and possibly conduct other attacks via a QuickTime Media Link (QTL) file with an embed XML element and a qtnext parameter that identifies resources outside of the original domain. NOTE: as of 20070912, this issue has been demonstrated by using instances of Components.interfaces.nsILocalFile and Components.interfaces.nsIProcess to execute arbitrary local files within Firefox and possibly Internet Explorer.
References
Configurations
History
No history.
Information
Published : 2006-09-25 00:07
Updated : 2024-02-04 17:13
NVD link : CVE-2006-4965
Mitre link : CVE-2006-4965
CVE.ORG link : CVE-2006-4965
JSON object : View
Products Affected
apple
- quicktime
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')