qt4-x11 vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the qt4-x11 package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • L
Integer Overflow or Wraparound

*
  • H
CVE-2023-37369

<4:4.8.7+dfsg-18+deb10u2
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<4:4.8.7+dfsg-18+deb10u2
  • M
Improper Certificate Validation

<4:4.8.7+dfsg-18+deb10u2
  • M
Divide By Zero

<4:4.8.7+dfsg-18+deb10u2
  • H
Buffer Overflow

<4:4.8.7+dfsg-18+deb10u2
  • M
Out-of-bounds Write

<4:4.8.7+dfsg-18+deb10u2
  • H
Out-of-bounds Read

<4:4.8.7+dfsg-18+deb10u2
  • M
Out-of-bounds Read

<4:4.8.7+dfsg-18+deb10u1
  • M
Divide By Zero

<4:4.8.7+dfsg-18
  • L
Out-of-Bounds

<4:4.8.7+dfsg-18
  • L
Improper Input Validation

<4:4.8.7+dfsg-18
  • L
Double Free

<4:4.8.7+dfsg-18
  • L
NULL Pointer Dereference

<4:4.8.7+dfsg-18
  • L
Resource Exhaustion

<4:4.8.7+dfsg-18
  • L
Out-of-Bounds

<4:4.8.7+dfsg-1
  • M
Out-of-Bounds

<4:4.8.6+git155-g716fbae+dfsg-2
  • M
Out-of-Bounds

<4:4.8.6+git155-g716fbae+dfsg-2
  • M
Out-of-Bounds

<4:4.8.6+git155-g716fbae+dfsg-2
  • M
Numeric Errors

<4:4.8.6+git64-g5dc8b2b+dfsg-3
  • L
NULL Pointer Dereference

<4:4.8.6+dfsg-1
  • L
Improper Input Validation

<4:4.8.5+git192-g085f851+dfsg-1
  • M
Information Exposure

<4:4.8.2+dfsg-7
  • M
Access Restriction Bypass

<4:4.8.2+dfsg-11
  • L
Cryptographic Issues

<4:4.8.2+dfsg-3
  • M
Improper Input Validation

<4:4.6.3-1
  • H
Out-of-Bounds

<4:4.7.4-1
  • H
Out-of-bounds Write

<4:4.7.4-1
  • L
Cryptographic Issues

<4:4.7.2-4
  • L
Improper Input Validation

<4:4.6.3-2
  • L
Cross-site Request Forgery (CSRF)

<4:4.6.2-4
  • M
CVE-2009-2841

<4:4.6.2-4
  • H
CVE-2009-3384

<4:4.6.2-4
  • L
Resource Management Errors

*
  • L
Information Exposure

<4:4.6.2-4
  • M
Improper Input Validation

<4:4.5.3-1
  • L
Cross-site Scripting (XSS)

*
  • M
Numeric Errors

<4:4.5.2-2
  • L
Resource Management Errors

<4:4.6.2-4
  • M
Cryptographic Issues

<4:4.6.2-4
  • M
Improper Input Validation

<4:4.6.2-4
  • L
Information Exposure

<4:4.6.2-4
  • L
Cross-site Scripting (XSS)

<4:4.6.3-1
  • H
Arbitrary Code Injection

<4:4.5.2-2
  • M
Information Exposure

<4:4.6.2-4
  • L
Information Exposure

<4:4.6.2-4
  • H
Resource Management Errors

<4:4.5.2-1
  • L
Cross-site Scripting (XSS)

<4:4.6.2-4
  • H
Information Exposure

<4:4.5.2-2
  • M
Cross-site Scripting (XSS)

<4:4.6.2-4
  • M
Information Exposure

<4:4.5.2-2
  • H
Resource Management Errors

<4:4.6.2-4
  • H
Arbitrary Code Injection

<4:4.5.2-1
  • L
CVE-2009-1710

<4:4.6.2-4
  • L
Cross-site Scripting (XSS)

<4:4.6.2-4
  • L
CVE-2009-1681

<4:4.6.2-4
  • M
Cross-site Scripting (XSS)

<4.4.3-1
  • M
Resource Management Errors

<4:4.5.2-1
  • L
Cross-site Scripting (XSS)

<4:4.6.2-4
  • M
Cross-site Scripting (XSS)

<4.4.3-1
  • L
Cross-site Scripting (XSS)

<4:4.6.2-4
  • H
Improper Input Validation

<4:4.6.2-4
  • M
CVE-2009-1693

<4:4.6.2-4
  • M
Cross-site Scripting (XSS)

<4.4.3-1
  • L
CVE-2009-1694

<4:4.6.2-4
  • M
Resource Management Errors

<4:4.5.2-1
  • M
Arbitrary Code Injection

<4:4.5.2-1
  • H
Resource Management Errors

<4:4.6.2-4
  • H
Resource Management Errors

<4:4.6.2-4
  • M
Access Restriction Bypass

<4.3.3-1
  • M
CVE-2007-0242

<4.2.2-2
  • M
Numeric Errors

<4.2.1-1
  • L
Cross-site Scripting (XSS)

<4:4.6.2-4