qt4-x11 vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the qt4-x11 package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • M
Out-of-bounds Write

<4:4.8.7+dfsg-11+deb9u3
  • H
Out-of-bounds Read

<4:4.8.7+dfsg-11+deb9u3
  • M
Out-of-bounds Read

<4:4.8.7+dfsg-11+deb9u1
  • M
Divide By Zero

<4:4.8.7+dfsg-11+deb9u1
  • C
Out-of-Bounds

<4:4.8.7+dfsg-11+deb9u1
  • M
Improper Input Validation

<4:4.8.7+dfsg-11+deb9u1
  • H
Double Free

<4:4.8.7+dfsg-11+deb9u1
  • H
NULL Pointer Dereference

<4:4.8.7+dfsg-11+deb9u1
  • M
Resource Exhaustion

<4:4.8.7+dfsg-11+deb9u1
  • L
Out-of-Bounds

<4:4.8.7+dfsg-1
  • M
Out-of-Bounds

<4:4.8.6+git155-g716fbae+dfsg-2
  • M
Out-of-Bounds

<4:4.8.6+git155-g716fbae+dfsg-2
  • M
Out-of-Bounds

<4:4.8.6+git155-g716fbae+dfsg-2
  • M
Numeric Errors

<4:4.8.6+git64-g5dc8b2b+dfsg-3
  • L
NULL Pointer Dereference

<4:4.8.6+dfsg-1
  • L
Improper Input Validation

<4:4.8.5+git192-g085f851+dfsg-1
  • M
Information Exposure

<4:4.8.2+dfsg-7
  • M
Access Restriction Bypass

<4:4.8.2+dfsg-11
  • L
Cryptographic Issues

<4:4.8.2+dfsg-3
  • M
Improper Input Validation

<4:4.6.3-1
  • H
Out-of-bounds Write

<4:4.7.4-1
  • H
Out-of-Bounds

<4:4.7.4-1
  • L
Cryptographic Issues

<4:4.7.2-4
  • L
Improper Input Validation

<4:4.6.3-2
  • L
Cross-site Request Forgery (CSRF)

<4:4.6.2-4
  • M
CVE-2009-2841

<4:4.6.2-4
  • H
CVE-2009-3384

<4:4.6.2-4
  • L
Resource Management Errors

*
  • L
Information Exposure

<4:4.6.2-4
  • M
Improper Input Validation

<4:4.5.3-1
  • L
Cross-site Scripting (XSS)

*
  • M
Numeric Errors

<4:4.5.2-2
  • L
Resource Management Errors

<4:4.6.2-4
  • M
Information Exposure

<4:4.5.2-2
  • L
Information Exposure

<4:4.6.2-4
  • H
Information Exposure

<4:4.5.2-2
  • H
Resource Management Errors

<4:4.5.2-1
  • L
Cross-site Scripting (XSS)

<4:4.6.2-4
  • L
CVE-2009-1710

<4:4.6.2-4
  • M
Improper Input Validation

<4:4.6.2-4
  • H
Arbitrary Code Injection

<4:4.5.2-2
  • H
Resource Management Errors

<4:4.6.2-4
  • M
Cryptographic Issues

<4:4.6.2-4
  • L
Cross-site Scripting (XSS)

<4:4.6.2-4
  • H
Arbitrary Code Injection

<4:4.5.2-1
  • L
Information Exposure

<4:4.6.2-4
  • M
Information Exposure

<4:4.6.2-4
  • M
Cross-site Scripting (XSS)

<4:4.6.2-4
  • L
Cross-site Scripting (XSS)

<4:4.6.3-1
  • M
Cross-site Scripting (XSS)

<4.4.3-1
  • M
Resource Management Errors

<4:4.5.2-1
  • M
Cross-site Scripting (XSS)

<4.4.3-1
  • L
CVE-2009-1681

<4:4.6.2-4
  • L
Cross-site Scripting (XSS)

<4:4.6.2-4
  • M
CVE-2009-1693

<4:4.6.2-4
  • H
Improper Input Validation

<4:4.6.2-4
  • M
Cross-site Scripting (XSS)

<4.4.3-1
  • L
CVE-2009-1694

<4:4.6.2-4
  • L
Cross-site Scripting (XSS)

<4:4.6.2-4
  • M
Resource Management Errors

<4:4.5.2-1
  • M
Arbitrary Code Injection

<4:4.5.2-1
  • H
Resource Management Errors

<4:4.6.2-4
  • H
Resource Management Errors

<4:4.6.2-4
  • M
Access Restriction Bypass

<4.3.3-1
  • M
CVE-2007-0242

<4.2.2-2
  • M
Numeric Errors

<4.2.1-1
  • L
Cross-site Scripting (XSS)

<4:4.6.2-4