Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
qt qt 5.0.2 vulnerabilities and exploits
(subscribe to this query)
6.8
CVSSv2
CVE-2015-1858
Multiple buffer overflows in gui/image/qbmphandler.cpp in the QtBase module in Qt prior to 4.8.7 and 5.x prior to 5.4.2 allow remote malicious users to cause a denial of service (segmentation fault and crash) and possibly execute arbitrary code via a crafted BMP image.
Digia Qt
Qt Qt 5.0.1
Qt Qt 5.0.0
Qt Qt 5.1.0
Qt Qt 5.2.0
Qt Qt 5.3.0
Qt Qt 5.4.1
Qt Qt 5.0.2
Qt Qt 5.2.1
Fedoraproject Fedora 22
Fedoraproject Fedora 20
Fedoraproject Fedora 21
6.8
CVSSv2
CVE-2015-1859
Multiple buffer overflows in plugins/imageformats/ico/qicohandler.cpp in the QtBase module in Qt prior to 4.8.7 and 5.x prior to 5.4.2 allow remote malicious users to cause a denial of service (segmentation fault and crash) and possibly execute arbitrary code via a crafted ICO im...
Fedoraproject Fedora 22
Fedoraproject Fedora 20
Fedoraproject Fedora 21
Digia Qt
Qt Qt 5.0.1
Qt Qt 5.0.0
Qt Qt 5.1.0
Qt Qt 5.2.0
Qt Qt 5.3.0
Qt Qt 5.4.1
Qt Qt 5.0.2
Qt Qt 5.2.1
6.8
CVSSv2
CVE-2015-1860
Multiple buffer overflows in gui/image/qgifhandler.cpp in the QtBase module in Qt prior to 4.8.7 and 5.x prior to 5.4.2 allow remote malicious users to cause a denial of service (segmentation fault) and possibly execute arbitrary code via a crafted GIF image.
Fedoraproject Fedora 22
Fedoraproject Fedora 20
Fedoraproject Fedora 21
Digia Qt
Qt Qt 5.0.1
Qt Qt 5.0.0
Qt Qt 5.1.0
Qt Qt 5.2.0
Qt Qt 5.3.0
Qt Qt 5.4.1
Qt Qt 5.0.2
Qt Qt 5.2.1
5
CVSSv2
CVE-2013-4549
QXmlSimpleReader in Qt prior to 5.2 allows context-dependent malicious users to cause a denial of service (memory consumption) via an XML Entity Expansion (XEE) attack.
Digia Qt
Qt Qt 5.0.2
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-28995
CVE-2024-36680
CVE-2024-35537
unauthorized
CVE-2024-21518
CVE-2024-37673
cross-site scripting
SSRF
CVE-2024-6241
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started