Shodan
Maps
Images
Monitor
Developer
More...
Dashboard
View Api Docs
Vulnerabilities
By Date
Known Exploited
Advanced Search
Vulnerable Software
Vendors
Products
Vulnerability Details CVE-2018-15518
QXmlStream in Qt 5.x before 5.11.3 has a double-free or corruption during parsing of a specially crafted illegal XML document.
Exploit prediction scoring system (EPSS) score
EPSS Score
0.022
EPSS Ranking
83.6%
CVSS Severity
CVSS v3 Score
8.8
CVSS v2 Score
6.8
References
http://lists.opensuse.org/opensuse-security-announce/2018-12/msg00066.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00071.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00073.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00090.html
https://access.redhat.com/errata/RHSA-2019:2135
https://access.redhat.com/errata/RHSA-2019:3390
https://blog.qt.io/blog/2018/12/04/qt-5-11-3-released-important-security-updates/
https://blog.qt.io/blog/2018/12/04/qt-5-11-3-released-important-security-updates/
https://codereview.qt-project.org/#/c/236691/
https://codereview.qt-project.org/#/c/236691/
https://lists.debian.org/debian-lts-announce/2019/01/msg00004.html
https://lists.debian.org/debian-lts-announce/2019/05/msg00014.html
https://lists.debian.org/debian-lts-announce/2020/09/msg00023.html
https://usn.ubuntu.com/4003-1/
https://www.debian.org/security/2019/dsa-4374
http://lists.opensuse.org/opensuse-security-announce/2018-12/msg00066.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00071.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00073.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00090.html
https://access.redhat.com/errata/RHSA-2019:2135
https://access.redhat.com/errata/RHSA-2019:3390
https://blog.qt.io/blog/2018/12/04/qt-5-11-3-released-important-security-updates/
https://blog.qt.io/blog/2018/12/04/qt-5-11-3-released-important-security-updates/
https://codereview.qt-project.org/#/c/236691/
https://codereview.qt-project.org/#/c/236691/
https://lists.debian.org/debian-lts-announce/2019/01/msg00004.html
https://lists.debian.org/debian-lts-announce/2019/05/msg00014.html
https://lists.debian.org/debian-lts-announce/2020/09/msg00023.html
https://usn.ubuntu.com/4003-1/
https://www.debian.org/security/2019/dsa-4374
Products affected by CVE-2018-15518
Qt
»
Qt
»
Version:
5.10.0
cpe:2.3:a:qt:qt:5.10.0
Qt
»
Qt
»
Version:
5.10.1
cpe:2.3:a:qt:qt:5.10.1
Qt
»
Qt
»
Version:
5.11.0
cpe:2.3:a:qt:qt:5.11.0
Qt
»
Qt
»
Version:
5.11.1
cpe:2.3:a:qt:qt:5.11.1
Qt
»
Qt
»
Version:
5.11.2
cpe:2.3:a:qt:qt:5.11.2
Qt
»
Qt
»
Version:
5.5.0
cpe:2.3:a:qt:qt:5.5.0
Qt
»
Qt
»
Version:
5.5.1
cpe:2.3:a:qt:qt:5.5.1
Qt
»
Qt
»
Version:
5.5.2
cpe:2.3:a:qt:qt:5.5.2
Qt
»
Qt
»
Version:
5.6.0
cpe:2.3:a:qt:qt:5.6.0
Qt
»
Qt
»
Version:
5.6.1
cpe:2.3:a:qt:qt:5.6.1
Qt
»
Qt
»
Version:
5.6.1-1
cpe:2.3:a:qt:qt:5.6.1-1
Qt
»
Qt
»
Version:
5.6.2
cpe:2.3:a:qt:qt:5.6.2
Qt
»
Qt
»
Version:
5.6.3
cpe:2.3:a:qt:qt:5.6.3
Qt
»
Qt
»
Version:
5.7
cpe:2.3:a:qt:qt:5.7
Qt
»
Qt
»
Version:
5.7.0
cpe:2.3:a:qt:qt:5.7.0
Qt
»
Qt
»
Version:
5.7.1
cpe:2.3:a:qt:qt:5.7.1
Qt
»
Qt
»
Version:
5.8.0
cpe:2.3:a:qt:qt:5.8.0
Qt
»
Qt
»
Version:
5.9.0
cpe:2.3:a:qt:qt:5.9.0
Qt
»
Qt
»
Version:
5.9.1
cpe:2.3:a:qt:qt:5.9.1
Qt
»
Qt
»
Version:
5.9.10
cpe:2.3:a:qt:qt:5.9.10
Qt
»
Qt
»
Version:
5.9.2
cpe:2.3:a:qt:qt:5.9.2
Qt
»
Qt
»
Version:
5.9.3
cpe:2.3:a:qt:qt:5.9.3
Qt
»
Qt
»
Version:
5.9.4
cpe:2.3:a:qt:qt:5.9.4
Qt
»
Qt
»
Version:
5.9.5
cpe:2.3:a:qt:qt:5.9.5
Qt
»
Qt
»
Version:
5.9.6
cpe:2.3:a:qt:qt:5.9.6
Qt
»
Qt
»
Version:
5.9.7
cpe:2.3:a:qt:qt:5.9.7
Qt
»
Qt
»
Version:
5.9.8
cpe:2.3:a:qt:qt:5.9.8
Qt
»
Qt
»
Version:
5.9.9
cpe:2.3:a:qt:qt:5.9.9
Debian
»
Debian Linux
»
Version:
8.0
cpe:2.3:o:debian:debian_linux:8.0
Debian
»
Debian Linux
»
Version:
9.0
cpe:2.3:o:debian:debian_linux:9.0
Opensuse
»
Leap
»
Version:
42.3
cpe:2.3:o:opensuse:leap:42.3
Products
Monitor
Search Engine
Developer API
Maps
Bulk Data
Images
Snippets
Pricing
Membership
API Subscriptions
Enterprise
Contact Us
support@shodan.io
Shodan ® - All rights reserved