source: https://www.securityfocus.com/bid/19976/info
Apple QuickTime is prone to multiple vulnerabilities because it fails to properly bounds-check and sanitize user-supplied data.
An attacker can exploit these issues to execute arbitrary code in the context of the victim user running the vulnerable application. Successful exploits may facilitate a remote compromise of affected computers.
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/28521.zip