Home
How it works
Integrations
Pricing
Vulnerability Database
Breach Intelligence
Search Data
Database Index
Blog
Contact
Book a Demo
Vulnerability Database
Total number of vulnerabilities in the DB: 314,496
With exploit
apple / quicktime
You can search for specific versions with
https://synscan.net/product/quicktime/1.2.3
Title
Severity
Exploit
Date
Affected Version
CVE-2013-1016
High
May 24, 2013
<= 7.7.3
== 3.0
== 4.1.2
== 5.0
== 5.0.1
== 5.0.2
== 6.0
== 6.0.0
== 6.0.1
== 6.0.2
== 6.1
== 6.1.0
== 6.1.1
== 6.2.0
== 6.3.0
== 6.4.0
== 6.5
== 6.5.0
== 6.5.1
== 6.5.2
== 7.0.0
== 7.0.1
== 7.0.2
== 7.0.3
== 7.0.4
== 7.1.0
== 7.1.1
== 7.1.2
== 7.1.3
== 7.1.4
== 7.1.5
== 7.1.6
== 7.2.0
== 7.2.1
== 7.3.0
== 7.3.1
== 7.4.0
== 7.4.1
== 7.4.5
== 7.5.0
== 7.5.5
== 7.6.0
== 7.6.1
== 7.6.2
== 7.6.5
== 7.6.6
== 7.6.7
== 7.6.8
== 7.6.9
== 7.7.0
== 7.7.1
== 7.7.2
CVE-2013-1017
High
May 24, 2013
<= 7.7.3
== 3.0
== 4.1.2
== 5.0
== 5.0.1
== 5.0.2
== 6.0
== 6.0.0
== 6.0.1
== 6.0.2
== 6.1
== 6.1.0
== 6.1.1
== 6.2.0
== 6.3.0
== 6.4.0
== 6.5
== 6.5.0
== 6.5.1
== 6.5.2
== 7.0.0
== 7.0.1
== 7.0.2
== 7.0.3
== 7.0.4
== 7.1.0
== 7.1.1
== 7.1.2
== 7.1.3
== 7.1.4
== 7.1.5
== 7.1.6
== 7.2.0
== 7.2.1
== 7.3.0
== 7.3.1
== 7.4.0
== 7.4.1
== 7.4.5
== 7.5.0
== 7.5.5
== 7.6.0
== 7.6.1
== 7.6.2
== 7.6.5
== 7.6.6
== 7.6.7
== 7.6.8
== 7.6.9
== 7.7.0
== 7.7.1
== 7.7.2
CVE-2013-1018
High
May 24, 2013
<= 7.7.3
== 3.0
== 4.1.2
== 5.0
== 5.0.1
== 5.0.2
== 6.0
== 6.0.0
== 6.0.1
== 6.0.2
== 6.1
== 6.1.0
== 6.1.1
== 6.2.0
== 6.3.0
== 6.4.0
== 6.5
== 6.5.0
== 6.5.1
== 6.5.2
== 7.0.0
== 7.0.1
== 7.0.2
== 7.0.3
== 7.0.4
== 7.1.0
== 7.1.1
== 7.1.2
== 7.1.3
== 7.1.4
== 7.1.5
== 7.1.6
== 7.2.0
== 7.2.1
== 7.3.0
== 7.3.1
== 7.4.0
== 7.4.1
== 7.4.5
== 7.5.0
== 7.5.5
== 7.6.0
== 7.6.1
== 7.6.2
== 7.6.5
== 7.6.6
== 7.6.7
== 7.6.8
== 7.6.9
== 7.7.0
== 7.7.1
== 7.7.2
CVE-2013-1019
High
May 24, 2013
<= 7.7.3
== 3.0
== 4.1.2
== 5.0
== 5.0.1
== 5.0.2
== 6.0
== 6.0.0
== 6.0.1
== 6.0.2
== 6.1
== 6.1.0
== 6.1.1
== 6.2.0
== 6.3.0
== 6.4.0
== 6.5
== 6.5.0
== 6.5.1
== 6.5.2
== 7.0.0
== 7.0.1
== 7.0.2
== 7.0.3
== 7.0.4
== 7.1.0
== 7.1.1
== 7.1.2
== 7.1.3
== 7.1.4
== 7.1.5
== 7.1.6
== 7.2.0
== 7.2.1
== 7.3.0
== 7.3.1
== 7.4.0
== 7.4.1
== 7.4.5
== 7.5.0
== 7.5.5
== 7.6.0
== 7.6.1
== 7.6.2
== 7.6.5
== 7.6.6
== 7.6.7
== 7.6.8
== 7.6.9
== 7.7.0
== 7.7.1
== 7.7.2
CVE-2013-1020
High
May 24, 2013
<= 7.7.3
== 3.0
== 4.1.2
== 5.0
== 5.0.1
== 5.0.2
== 6.0
== 6.0.0
== 6.0.1
== 6.0.2
== 6.1
== 6.1.0
== 6.1.1
== 6.2.0
== 6.3.0
== 6.4.0
== 6.5
== 6.5.0
== 6.5.1
== 6.5.2
== 7.0.0
== 7.0.1
== 7.0.2
== 7.0.3
== 7.0.4
== 7.1.0
== 7.1.1
== 7.1.2
== 7.1.3
== 7.1.4
== 7.1.5
== 7.1.6
== 7.2.0
== 7.2.1
== 7.3.0
== 7.3.1
== 7.4.0
== 7.4.1
== 7.4.5
== 7.5.0
== 7.5.5
== 7.6.0
== 7.6.1
== 7.6.2
== 7.6.5
== 7.6.6
== 7.6.7
== 7.6.8
== 7.6.9
== 7.7.0
== 7.7.1
== 7.7.2
CVE-2013-1021
High
May 24, 2013
<= 7.7.3
== 3.0
== 4.1.2
== 5.0
== 5.0.1
== 5.0.2
== 6.0
== 6.0.0
== 6.0.1
== 6.0.2
== 6.1
== 6.1.0
== 6.1.1
== 6.2.0
== 6.3.0
== 6.4.0
== 6.5
== 6.5.0
== 6.5.1
== 6.5.2
== 7.0.0
== 7.0.1
== 7.0.2
== 7.0.3
== 7.0.4
== 7.1.0
== 7.1.1
== 7.1.2
== 7.1.3
== 7.1.4
== 7.1.5
== 7.1.6
== 7.2.0
== 7.2.1
== 7.3.0
== 7.3.1
== 7.4.0
== 7.4.1
== 7.4.5
== 7.5.0
== 7.5.5
== 7.6.0
== 7.6.1
== 7.6.2
== 7.6.5
== 7.6.6
== 7.6.7
== 7.6.8
== 7.6.9
== 7.7.0
== 7.7.1
== 7.7.2
CVE-2013-1022
High
May 24, 2013
<= 7.7.3
== 3.0
== 4.1.2
== 5.0
== 5.0.1
== 5.0.2
== 6.0
== 6.0.0
== 6.0.1
== 6.0.2
== 6.1
== 6.1.0
== 6.1.1
== 6.2.0
== 6.3.0
== 6.4.0
== 6.5
== 6.5.0
== 6.5.1
== 6.5.2
== 7.0.0
== 7.0.1
== 7.0.2
== 7.0.3
== 7.0.4
== 7.1.0
== 7.1.1
== 7.1.2
== 7.1.3
== 7.1.4
== 7.1.5
== 7.1.6
== 7.2.0
== 7.2.1
== 7.3.0
== 7.3.1
== 7.4.0
== 7.4.1
== 7.4.5
== 7.5.0
== 7.5.5
== 7.6.0
== 7.6.1
== 7.6.2
== 7.6.5
== 7.6.6
== 7.6.7
== 7.6.8
== 7.6.9
== 7.7.0
== 7.7.1
== 7.7.2
CVE-2011-1374
High
Nov 9, 2012
== 7.6.8
== 7.3.1
== 7.6.7
== 6.5.1
== 6.0.1
== 6.2.0
== 5.0
== 7.0.3
== 6.1.1
== 7.5.0
== 7.1.5
== 7.6.1
== 7.0.1
== 7.1.6
<= 7.7.2
== 7.4.1
== 7.4.5
== 4.1.2
== 7.6.9
== 7.7.1
== 7.2.1
== 5.0.2
== 7.0.2
== 7.2.0
== 5.0.1
== 6.0.2
== 7.6.0
== 7.3.0
== 6.4.0
== 3.0
== 7.0.4
== 6.1
== 6.5
== 7.3.1.70
== 7.1.2
== 7.4.0
== 7.1.1
== 7.6.6
== 7.7.0
== 6.0.0
== 6.3.0
== 7.1.4
== 6.5.2
== 6.5.0
== 7.1.3
== 7.5.5
== 7.6.2
== 7.6.5
== 7.1.0
== 6.0
== 7.0.0
CVE-2012-3751
High
Nov 9, 2012
== 7.6.8
== 7.3.1
== 7.6.7
== 6.5.1
== 6.0.1
== 6.2.0
== 5.0
== 7.0.3
== 6.1.1
== 7.5.0
== 7.1.5
== 7.6.1
== 7.0.1
== 7.1.6
<= 7.7.2
== 7.4.1
== 7.4.5
== 4.1.2
== 7.6.9
== 7.7.1
== 7.2.1
== 5.0.2
== 7.0.2
== 7.2.0
== 5.0.1
== 6.0.2
== 7.6.0
== 7.3.0
== 6.4.0
== 3.0
== 7.0.4
== 6.1
== 6.5
== 7.3.1.70
== 7.1.2
== 7.4.0
== 7.1.1
== 7.6.6
== 7.7.0
== 6.0.0
== 6.3.0
== 7.1.4
== 6.5.2
== 6.5.0
== 7.1.3
== 7.5.5
== 7.6.2
== 7.6.5
== 7.1.0
== 6.0
== 7.0.0
CVE-2012-3752
High
Nov 9, 2012
== 7.6.8
== 7.3.1
== 7.6.7
== 6.5.1
== 6.0.1
== 6.2.0
== 5.0
== 7.0.3
== 6.1.1
== 7.5.0
== 7.1.5
== 7.6.1
== 7.0.1
== 7.1.6
<= 7.7.2
== 7.4.1
== 7.4.5
== 4.1.2
== 7.6.9
== 7.7.1
== 7.2.1
== 5.0.2
== 7.0.2
== 7.2.0
== 5.0.1
== 6.0.2
== 7.6.0
== 7.3.0
== 6.4.0
== 3.0
== 7.0.4
== 6.1
== 6.5
== 7.3.1.70
== 7.1.2
== 7.4.0
== 7.1.1
== 7.6.6
== 7.7.0
== 6.0.0
== 6.3.0
== 7.1.4
== 6.5.2
== 6.5.0
== 7.1.3
== 7.5.5
== 7.6.2
== 7.6.5
== 7.1.0
== 6.0
== 7.0.0
‹
›
‹
1
2
...
5
6
7
...
24
25
›