The remote host is vulnerable to multiple buffer overflows.
According to its version, the installation of QuickTime on the remote Windows host is affected by a flaw in the way that it handles malformed Java byte code. An attacker exploiting this flaw would need to be able to convince a user to browse to a malicious site. Further, the browser must be Java-enabled and have a vulnerable version of QuickTime installed. Successful exploitation would result in the attacker executing arbitrary code on the client system. In addition, this version of QuickTime is vulnerable to an integer overflow and a heap overflow. An attacker exploiting either of these flaws will be able to execute code on the remote machine.
Upgrade to version 7.1.6 or higher.