Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2012-5624

Опубликовано: 24 фев. 2013
Источник: debian
EPSS Низкий

Описание

The XMLHttpRequest object in Qt before 4.8.4 enables http redirection to the file scheme, which allows man-in-the-middle attackers to force the read of arbitrary local files and possibly obtain sensitive information via a file: URL to a QML application.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
qt4-x11fixed4:4.8.2+dfsg-7package
qt4-x11not-affectedsqueezepackage

Примечания

  • http://lists.qt-project.org/pipermail/announce/2012-November/000014.html

EPSS

Процентиль: 83%
0.01869
Низкий

Связанные уязвимости

ubuntu
почти 13 лет назад

The XMLHttpRequest object in Qt before 4.8.4 enables http redirection to the file scheme, which allows man-in-the-middle attackers to force the read of arbitrary local files and possibly obtain sensitive information via a file: URL to a QML application.

redhat
около 13 лет назад

The XMLHttpRequest object in Qt before 4.8.4 enables http redirection to the file scheme, which allows man-in-the-middle attackers to force the read of arbitrary local files and possibly obtain sensitive information via a file: URL to a QML application.

nvd
почти 13 лет назад

The XMLHttpRequest object in Qt before 4.8.4 enables http redirection to the file scheme, which allows man-in-the-middle attackers to force the read of arbitrary local files and possibly obtain sensitive information via a file: URL to a QML application.

github
больше 3 лет назад

The XMLHttpRequest object in Qt before 4.8.4 enables http redirection to the file scheme, which allows man-in-the-middle attackers to force the read of arbitrary local files and possibly obtain sensitive information via a file: URL to a QML application.

EPSS

Процентиль: 83%
0.01869
Низкий