Vulnerability Monitor

The vendors, products, and vulnerabilities you care about
quicktime Vendor: apple

About This Product

quicktime is a software product developed by apple, a major technology provider with a global presence in enterprise and consumer markets. This product is widely deployed in production environments, making vulnerability monitoring essential for organizations relying on it. Security vulnerabilities in products of this category can affect system availability, data confidentiality, and integrity across entire networks. The significant number of reported vulnerabilities indicates this product has received substantial security scrutiny and community focus over time. Regular assessment of known vulnerabilities and timely patching are fundamental components of responsible system administration for any deployment of this software.

Vulnerability Landscape Summary

SecUtils has identified 250 known vulnerabilities affecting apple quicktime. This includes 1 critical-severity issue and 144 high-severity issues that warrant immediate attention. Vulnerabilities in this product have been disclosed spanning from 2001 to 2017, indicating a sustained research interest and ongoing security attention. 103 medium-severity issues and 2 low-severity issues complete the vulnerability landscape. Organizations should prioritize patching based on deployment context, asset criticality, and exploitation likelihood rather than severity alone.

Known Vulnerabilities
ID Date Published Last Modified Severity (CVSSv3) Severity (CVSSv2) Exploit Available
CVE-2001-0198 2001-05-03 2025-04-03 - 7.6 Unknown
CVE-2002-0252 2002-05-29 2025-04-03 - 7.5 Likely
CVE-2002-0376 2002-09-24 2025-04-03 - 7.5 Likely
CVE-2003-0168 2003-04-02 2025-04-03 - 7.5 Likely
CVE-2004-0431 2004-07-07 2025-04-03 - 5.1 Unknown
CVE-2004-0921 2005-01-27 2025-04-03 - 7.5 Likely
CVE-2004-0922 2005-01-27 2025-04-03 - 5.0 Likely
CVE-2004-0988 2005-03-01 2025-04-03 - 5.0 Likely
CVE-2005-1579 2005-05-12 2025-04-03 - 5.0 Likely
CVE-2005-2743 2005-10-26 2025-04-03 - 7.5 Likely
CVE-2005-2753 2005-11-05 2025-04-03 - 5.1 Unknown
CVE-2005-2754 2005-11-05 2025-04-03 - 5.1 Unknown
CVE-2005-2755 2005-11-05 2025-04-03 - 2.6 Unknown
CVE-2005-2756 2005-11-05 2025-04-03 - 5.1 Unknown
CVE-2005-4092 2005-12-08 2025-04-03 - 7.5 Likely
CVE-2005-2340 2005-12-31 2025-04-03 - 7.5 Likely
CVE-2005-3707 2005-12-31 2025-04-03 - 7.5 Likely
CVE-2005-3708 2005-12-31 2025-04-03 - 7.5 Likely
CVE-2005-3709 2005-12-31 2025-04-03 - 7.5 Likely
CVE-2005-3710 2005-12-31 2025-04-03 - 7.5 Likely
CVE-2005-3711 2005-12-31 2025-04-03 - 7.5 Likely
CVE-2005-3713 2005-12-31 2025-04-03 - 7.5 Likely
CVE-2006-1249 2006-03-19 2025-04-03 - 6.8 Likely
CVE-2006-1453 2006-05-12 2025-04-03 - 5.1 Unknown
CVE-2006-1454 2006-05-12 2025-04-03 - 5.1 Unknown
CVE-2006-1458 2006-05-12 2025-04-03 - 5.1 Unknown
CVE-2006-1459 2006-05-12 2025-04-03 - 5.1 Unknown
CVE-2006-1460 2006-05-12 2025-04-03 - 5.1 Unknown
CVE-2006-1461 2006-05-12 2025-04-03 - 5.1 Unknown
CVE-2006-1462 2006-05-12 2025-04-03 - 5.1 Unknown
CVE-2006-1463 2006-05-12 2025-04-03 - 5.1 Unknown
CVE-2006-1464 2006-05-12 2025-04-03 - 5.1 Unknown
CVE-2006-1465 2006-05-12 2025-04-03 - 5.1 Unknown
CVE-2006-2238 2006-05-12 2025-04-03 - 7.5 Likely
CVE-2006-4381 2006-09-12 2025-04-03 - 5.1 Unknown
CVE-2006-4382 2006-09-12 2025-04-03 - 5.1 Unknown
CVE-2006-4384 2006-09-12 2025-04-03 - 5.1 Unknown
CVE-2006-4385 2006-09-12 2025-04-03 - 5.1 Unknown
CVE-2006-4386 2006-09-12 2025-04-03 - 5.1 Unknown
CVE-2006-4388 2006-09-12 2025-04-03 - 5.1 Unknown
CVE-2006-4389 2006-09-12 2025-04-03 - 5.1 Unknown
CVE-2006-4965 2006-09-25 2025-04-03 - 5.0 Likely
CVE-2007-0015 2007-01-01 2025-04-09 - 6.8 Likely
CVE-2007-0059 2007-01-05 2025-04-09 - 6.8 Likely
CVE-2007-0462 2007-01-26 2025-04-09 - 10.0 Likely
CVE-2007-0588 2007-01-30 2025-04-09 - 7.1 Likely
CVE-2007-0711 2007-03-05 2025-04-09 - 9.3 Likely
CVE-2007-0712 2007-03-05 2025-04-09 - 9.3 Likely
CVE-2007-0713 2007-03-05 2025-04-09 - 5.8 Likely
CVE-2007-0714 2007-03-05 2025-04-09 - 9.3 Likely
CVE-2007-0715 2007-03-05 2025-04-09 - 5.8 Likely
CVE-2007-0716 2007-03-05 2025-04-09 - 5.8 Likely
CVE-2007-0717 2007-03-05 2025-04-09 - 5.8 Likely
CVE-2007-0718 2007-03-05 2025-04-09 - 5.8 Likely
CVE-2007-2295 2007-04-26 2025-04-09 - 9.3 Likely
CVE-2007-2296 2007-04-26 2025-04-09 - 9.3 Likely
CVE-2007-0754 2007-05-14 2025-04-09 - 9.3 Likely
CVE-2007-2388 2007-05-29 2025-04-09 - 9.3 Likely
CVE-2007-2389 2007-05-29 2025-04-09 - 7.1 Likely
CVE-2007-2392 2007-07-15 2025-04-09 - 9.3 Likely
CVE-2007-2393 2007-07-15 2025-04-09 - 9.3 Likely
CVE-2007-2394 2007-07-15 2025-04-09 - 9.3 Likely
CVE-2007-2396 2007-07-15 2025-04-09 - 9.3 Likely
CVE-2007-2397 2007-07-15 2025-04-09 - 9.3 Likely
CVE-2007-2402 2007-07-15 2025-04-09 - 4.3 Likely
CVE-2007-5045 2007-09-24 2025-04-09 - 9.3 Likely
CVE-2007-4673 2007-10-04 2025-04-09 - 9.3 Likely
CVE-2007-2395 2007-11-07 2025-04-09 - 9.3 Likely
CVE-2007-3750 2007-11-07 2025-04-09 - 9.3 Likely
CVE-2007-3751 2007-11-07 2025-04-09 - 9.3 Likely
CVE-2007-4672 2007-11-07 2025-04-09 - 7.6 Unknown
CVE-2007-4675 2007-11-07 2025-04-09 - 9.3 Likely
CVE-2007-4676 2007-11-07 2025-04-09 - 9.3 Likely
CVE-2007-4677 2007-11-07 2025-04-09 - 9.3 Likely
CVE-2007-4674 2007-11-27 2025-04-09 - 6.8 Likely
CVE-2007-6166 2007-11-29 2025-04-09 - 9.3 Likely
CVE-2007-6238 2007-12-04 2025-04-09 - 10.0 Likely
CVE-2007-4706 2007-12-15 2025-04-09 - 6.8 Likely
CVE-2007-4707 2007-12-15 2025-04-09 - 9.3 Likely
CVE-2008-0234 2008-01-11 2025-04-09 - 9.3 Likely
CVE-2008-0031 2008-01-16 2025-04-09 - 5.8 Likely
CVE-2008-0032 2008-01-16 2025-04-09 - 5.8 Likely
CVE-2008-0033 2008-01-16 2025-04-09 - 9.3 Likely
CVE-2008-0036 2008-01-16 2025-04-09 - 6.8 Likely
CVE-2008-0778 2008-02-14 2025-04-09 - 7.5 Likely
CVE-2008-1013 2008-04-04 2025-04-09 - 6.8 Likely
CVE-2008-1014 2008-04-04 2025-04-09 - 4.3 Likely
CVE-2008-1015 2008-04-04 2025-04-09 - 6.8 Likely
CVE-2008-1016 2008-04-04 2025-04-09 - 6.8 Likely
CVE-2008-1017 2008-04-04 2025-04-09 - 6.8 Likely
CVE-2008-1018 2008-04-04 2025-04-09 - 6.8 Likely
CVE-2008-1019 2008-04-04 2025-04-09 - 6.8 Likely
CVE-2008-1020 2008-04-04 2025-04-09 - 6.8 Likely
CVE-2008-1021 2008-04-04 2025-04-09 - 6.8 Likely
CVE-2008-1022 2008-04-04 2025-04-09 - 6.8 Likely
CVE-2008-1023 2008-04-04 2025-04-09 - 6.8 Likely
CVE-2008-2010 2008-04-30 2025-04-09 - 9.3 Likely
CVE-2008-1581 2008-06-10 2025-04-09 - 6.8 Likely
CVE-2008-1582 2008-06-10 2025-04-09 - 6.8 Likely
CVE-2008-1583 2008-06-10 2025-04-09 - 6.8 Likely
CVE-2008-1584 2008-06-10 2025-04-09 - 6.8 Likely
CVE-2008-1585 2008-06-10 2025-04-09 - 6.8 Likely
CVE-2008-1739 2008-09-03 2025-04-09 - 6.8 Likely
CVE-2008-3614 2008-09-11 2025-04-09 - 6.8 Likely
CVE-2008-3615 2008-09-11 2025-04-09 - 9.3 Likely
CVE-2008-3624 2008-09-11 2025-04-09 - 6.8 Likely
CVE-2008-3625 2008-09-11 2025-04-09 - 9.3 Likely
CVE-2008-3626 2008-09-11 2025-04-09 - 6.8 Likely
CVE-2008-3627 2008-09-11 2025-04-09 - 9.3 Likely
CVE-2008-3628 2008-09-11 2025-04-09 - 9.3 Likely
CVE-2008-3629 2008-09-11 2025-04-09 - 4.3 Likely
CVE-2008-3635 2008-09-11 2025-04-09 - 9.3 Likely
CVE-2008-4116 2008-09-18 2025-04-09 - 9.3 Likely
CVE-2008-5406 2008-12-10 2025-04-09 - 9.3 Likely
CVE-2009-0001 2009-01-21 2025-04-09 - 9.3 Likely
CVE-2009-0002 2009-01-21 2025-04-09 - 9.3 Likely
CVE-2009-0003 2009-01-21 2025-04-09 - 9.3 Likely
CVE-2009-0004 2009-01-21 2025-04-09 - 9.3 Likely
CVE-2009-0005 2009-01-21 2025-04-09 - 9.3 Likely
CVE-2009-0006 2009-01-21 2025-04-09 - 9.3 Likely
CVE-2009-0007 2009-01-21 2025-04-09 - 9.3 Likely
CVE-2009-0185 2009-06-02 2025-04-09 - 9.3 Likely
CVE-2009-0188 2009-06-02 2025-04-09 - 9.3 Likely
CVE-2009-0951 2009-06-02 2025-04-09 - 9.3 Likely
CVE-2009-0952 2009-06-02 2025-04-09 - 9.3 Likely
CVE-2009-0953 2009-06-02 2025-04-09 - 9.3 Likely
CVE-2009-0954 2009-06-02 2025-04-09 - 9.3 Likely
CVE-2009-0955 2009-06-02 2025-04-09 - 9.3 Likely
CVE-2009-0956 2009-06-02 2025-04-09 - 9.3 Likely
CVE-2009-0957 2009-06-02 2025-04-09 - 9.3 Likely
CVE-2009-2202 2009-09-10 2025-04-09 - 9.3 Likely
CVE-2009-2203 2009-09-10 2025-04-09 - 9.3 Likely
CVE-2009-2798 2009-09-10 2025-04-09 - 9.3 Likely
CVE-2009-2799 2009-09-10 2025-04-09 - 9.3 Likely
CVE-2010-0527 2010-03-31 2025-04-11 - 9.3 Likely
CVE-2010-0528 2010-03-31 2025-04-11 - 9.3 Likely
CVE-2010-0529 2010-03-31 2025-04-11 - 9.3 Likely
CVE-2010-0536 2010-03-31 2025-04-11 - 9.3 Likely
CVE-2010-1799 2010-08-16 2025-04-11 - 9.3 Likely
CVE-2010-1818 2010-08-31 2025-04-11 - 9.3 Likely
CVE-2010-3788 2010-11-16 2025-04-11 - 6.8 Likely
CVE-2010-3789 2010-11-16 2025-04-11 - 6.8 Likely
CVE-2010-3790 2010-11-16 2025-04-11 - 6.8 Likely
CVE-2010-3791 2010-11-16 2025-04-11 - 6.8 Likely
CVE-2010-3792 2010-11-16 2025-04-11 - 6.8 Likely
CVE-2010-3793 2010-11-16 2025-04-11 - 6.8 Likely
CVE-2010-0530 2010-12-09 2025-04-11 - 2.1 Unknown
CVE-2010-1508 2010-12-09 2025-04-11 - 9.3 Likely
CVE-2010-3800 2010-12-09 2025-04-11 - 9.3 Likely
CVE-2010-3801 2010-12-09 2025-04-11 - 9.3 Likely
CVE-2010-3802 2010-12-09 2025-04-11 - 9.3 Likely
CVE-2010-4009 2010-12-09 2025-04-11 - 9.3 Likely
CVE-2011-0186 2011-03-23 2025-04-11 - 4.3 Likely
CVE-2011-0187 2011-03-23 2025-04-11 - 4.3 Likely
CVE-2011-0209 2011-06-24 2025-04-11 - 6.8 Likely
CVE-2011-0210 2011-06-24 2025-04-11 - 6.8 Likely
CVE-2011-0211 2011-06-24 2025-04-11 - 6.8 Likely
CVE-2011-0213 2011-06-24 2025-04-11 - 6.8 Likely
CVE-2011-0245 2011-08-04 2025-04-11 - 9.3 Likely
CVE-2011-0246 2011-08-04 2025-04-11 - 9.3 Likely
CVE-2011-0247 2011-08-04 2025-04-11 - 9.3 Likely
CVE-2011-0248 2011-08-04 2025-04-11 - 9.3 Likely
CVE-2011-0249 2011-08-04 2025-04-11 - 9.3 Likely
CVE-2011-0250 2011-08-04 2025-04-11 - 9.3 Likely
CVE-2011-0251 2011-08-04 2025-04-11 - 9.3 Likely
CVE-2011-0252 2011-08-04 2025-04-11 - 9.3 Likely
CVE-2011-0256 2011-08-15 2025-04-11 - 9.3 Likely
CVE-2011-0257 2011-08-15 2025-04-11 - 9.3 Likely
CVE-2011-0258 2011-09-06 2025-04-11 - 9.3 Likely
CVE-2011-3247 2011-10-28 2025-04-11 - 9.3 Likely
CVE-2011-3248 2011-10-28 2025-04-11 - 9.3 Likely
CVE-2011-3249 2011-10-28 2025-04-11 - 9.3 Likely
CVE-2011-3250 2011-10-28 2025-04-11 - 9.3 Likely
CVE-2011-3251 2011-10-28 2025-04-11 - 9.3 Likely
CVE-2012-0265 2012-05-16 2025-04-11 - 9.3 Likely
CVE-2012-0663 2012-05-16 2025-04-11 - 9.3 Likely
CVE-2012-0664 2012-05-16 2025-04-11 - 9.3 Likely
CVE-2012-0665 2012-05-16 2025-04-11 - 9.3 Likely
CVE-2012-0666 2012-05-16 2025-04-11 - 9.3 Likely
CVE-2012-0667 2012-05-16 2025-04-11 - 9.3 Likely
CVE-2012-0668 2012-05-16 2025-04-11 - 9.3 Likely
CVE-2012-0669 2012-05-16 2025-04-11 - 9.3 Likely
CVE-2012-0670 2012-05-16 2025-04-11 - 9.3 Likely
CVE-2012-0671 2012-05-16 2025-04-11 - 9.3 Likely
CVE-2011-1374 2012-11-09 2025-04-11 - 9.3 Likely
CVE-2012-3751 2012-11-09 2025-04-11 - 9.3 Likely
CVE-2012-3752 2012-11-09 2025-04-11 - 9.3 Likely
CVE-2012-3753 2012-11-09 2025-04-11 - 9.3 Likely
CVE-2012-3754 2012-11-09 2025-04-11 - 9.3 Likely
CVE-2012-3755 2012-11-09 2025-04-11 - 9.3 Likely
CVE-2012-3756 2012-11-09 2025-04-11 - 9.3 Likely
CVE-2012-3757 2012-11-09 2025-04-11 - 9.3 Likely
CVE-2012-3758 2012-11-09 2025-04-11 - 9.3 Likely
CVE-2013-0986 2013-05-24 2025-04-11 - 9.3 Likely
CVE-2013-0987 2013-05-24 2025-04-11 - 9.3 Likely
CVE-2013-0988 2013-05-24 2025-04-11 - 9.3 Likely
CVE-2013-0989 2013-05-24 2025-04-11 - 9.3 Likely
CVE-2013-1015 2013-05-24 2025-04-11 - 9.3 Likely
CVE-2013-1016 2013-05-24 2025-04-11 - 9.3 Likely
CVE-2013-1017 2013-05-24 2025-04-11 - 9.3 Likely
CVE-2013-1018 2013-05-24 2025-04-11 - 9.3 Likely
CVE-2013-1019 2013-05-24 2025-04-11 - 9.3 Likely
CVE-2013-1020 2013-05-24 2025-04-11 - 9.3 Likely
CVE-2013-1021 2013-05-24 2025-04-11 - 9.3 Likely
CVE-2013-1022 2013-05-24 2025-04-11 - 9.3 Likely
CVE-2013-1032 2013-09-16 2025-04-11 - 6.8 Likely
CVE-2010-1819 2013-12-27 2025-04-11 - 9.3 Likely
CVE-2014-1243 2014-02-27 2025-04-12 - 9.3 Likely
CVE-2014-1244 2014-02-27 2025-04-12 - 9.3 Likely
CVE-2014-1245 2014-02-27 2025-04-12 - 9.3 Likely
CVE-2014-1246 2014-02-27 2025-04-12 - 9.3 Likely
CVE-2014-1247 2014-02-27 2025-04-12 - 9.3 Likely
CVE-2014-1248 2014-02-27 2025-04-12 - 9.3 Likely
CVE-2014-1249 2014-02-27 2025-04-12 - 9.3 Likely
CVE-2014-1250 2014-02-27 2025-04-12 - 9.3 Likely
CVE-2014-1251 2014-02-27 2025-04-12 - 9.3 Likely
CVE-2014-4979 2014-07-26 2025-04-12 - 9.3 Likely
CVE-2015-3661 2015-07-03 2025-04-12 - 6.8 Likely
CVE-2015-3662 2015-07-03 2025-04-12 - 6.8 Likely
CVE-2015-3663 2015-07-03 2025-04-12 - 6.8 Likely
CVE-2015-3664 2015-07-03 2025-04-12 - 6.8 Likely
CVE-2015-3665 2015-07-03 2025-04-12 - 6.8 Likely
CVE-2015-3666 2015-07-03 2025-04-12 - 6.8 Likely
CVE-2015-3667 2015-07-03 2025-04-12 - 6.8 Likely
CVE-2015-3668 2015-07-03 2025-04-12 - 6.8 Likely
CVE-2015-3669 2015-07-03 2025-04-12 - 6.8 Likely
CVE-2015-3713 2015-07-03 2025-04-12 - 6.8 Likely
CVE-2015-3765 2015-08-16 2025-04-12 - 6.8 Likely
CVE-2015-3779 2015-08-16 2025-04-12 - 6.8 Likely
CVE-2015-3788 2015-08-16 2025-04-12 - 6.8 Likely
CVE-2015-3789 2015-08-17 2025-04-12 - 6.8 Likely
CVE-2015-3790 2015-08-17 2025-04-12 - 6.8 Likely
CVE-2015-3791 2015-08-17 2025-04-12 - 6.8 Likely
CVE-2015-3792 2015-08-17 2025-04-12 - 6.8 Likely
CVE-2015-5751 2015-08-17 2025-04-12 - 6.8 Likely
CVE-2015-5753 2015-08-17 2025-04-12 - 6.8 Likely
CVE-2015-5779 2015-08-17 2025-04-12 - 7.5 Likely
CVE-2015-5785 2015-08-25 2025-04-12 - 6.8 Likely
CVE-2015-5786 2015-08-25 2025-04-12 - 6.8 Likely
CVE-2015-7085 2016-01-09 2025-04-12 6.6 6.8 Likely
CVE-2015-7086 2016-01-09 2025-04-12 6.6 6.8 Likely
CVE-2015-7087 2016-01-09 2025-04-12 6.6 6.8 Likely
CVE-2015-7088 2016-01-09 2025-04-12 6.6 6.8 Likely
CVE-2015-7089 2016-01-09 2025-04-12 6.6 6.8 Likely
CVE-2015-7090 2016-01-09 2025-04-12 6.6 6.8 Likely
CVE-2015-7091 2016-01-09 2025-04-12 6.6 6.8 Likely
CVE-2015-7092 2016-01-09 2025-04-12 6.6 6.8 Likely
CVE-2015-7117 2016-01-09 2025-04-12 6.6 6.8 Likely
CVE-2011-3428 2017-04-24 2025-04-20 9.8 7.5 Likely
CVE-2017-2218 2017-07-07 2025-04-20 7.8 6.8 Likely

How SecUtils Interprets Product Data

SecUtils normalizes and enriches National Vulnerability Database (NVD) records for apple quicktime by standardizing vendor and product identifiers, aggregating vulnerability metadata from both NVD and MITRE sources, and structuring the data for rapid analysis and asset correlation. For every vulnerability listed, we extract Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) classifications, CVSS severity metrics, and reference information to enable organizations to prioritize patching and risk assessment efficiently. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for vulnerability management and security operations.