Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
qt qt 5.14.0 vulnerabilities and exploits
(subscribe to this query)
5
CVSSv2
CVE-2017-15011
The named pipes in qtsingleapp in Qt 5.x, as used in qBittorrent and SugarSync, are configured for remote access and allow remote malicious users to cause a denial of service (application crash) via an unspecified string.
Qt Qt 5.9.0
Qt Qt 5.10.0
Qt Qt 5.11.0
Qt Qt 5.12.0
Qt Qt 5.14.0
Qt Qt 5.0.1
Qt Qt 5.5.0
Qt Qt 5.7.0
Qt Qt 5.11.1
Qt Qt 5.11.3
Qt Qt 5.1.0
Qt Qt 5.2.0
Qt Qt 5.3.0
Qt Qt 5.4.0
Qt Qt 5.12.2
Qt Qt 5.12.3
Qt Qt 5.12.4
Qt Qt 5.13.0
Qt Qt 5.0.0
Qt Qt 5.6.0
Qt Qt 5.8.0
Qt Qt 5.10.1
6.8
CVSSv2
CVE-2020-24742
An issue has been fixed in Qt versions 5.14.0 where QPluginLoader attempts to load plugins relative to the working directory, allowing malicious users to execute arbitrary code via crafted files.
Qt Qt
4.4
CVSSv2
CVE-2020-0570
Uncontrolled search path in the QT Library prior to 5.14.0, 5.12.7 and 5.9.10 may allow an authenticated user to potentially enable elevation of privilege via local access.
Qt Qt
Redhat Enterprise Linux 7.0
Redhat Enterprise Linux 8.0
2.7
CVSSv2
CVE-2020-0569
Out of bounds write in Intel(R) PROSet/Wireless WiFi products on Windows 10 may allow an authenticated user to potentially enable denial of service via local access.
Intel Ax201 Firmware
Intel Ax200 Firmware
Intel Ac 9560 Firmware
Intel Ac 9462 Firmware
Intel Ac 9461 Firmware
Intel Ac 9260 Firmware
Intel Ac 8265 Firmware
Intel Ac 8260 Firmware
Intel Ac 3168 Firmware
Intel 7265 Firmware
Intel Ac 3165 Firmware
Debian Debian Linux 8.0
Debian Debian Linux 9.0
Debian Debian Linux 10.0
Canonical Ubuntu Linux 18.04
Canonical Ubuntu Linux 19.10
Canonical Ubuntu Linux 16.04
Opensuse Leap 15.1
Qt Qt
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-22460
CVE-2024-4646
CVE-2024-29212
IMAP
CVE-2023-36672
CVE-2024-34547
command injection
CVE-2024-4651
stored XSS
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started