{"api_version":"1","generated_at":"2026-05-04T05:55:11+00:00","cve":"CVE-2010-2621","urls":{"html":"https://cve.report/CVE-2010-2621","api":"https://cve.report/api/cve/CVE-2010-2621.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2010-2621","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2010-2621"},"summary":{"title":"CVE-2010-2621","description":"The QSslSocketBackendPrivate::transmit function in src_network_ssl_qsslsocket_openssl.cpp in Qt 4.6.3 and earlier allows remote attackers to cause a denial of service (infinite loop) via a malformed request.","state":"PUBLISHED","assigner":"mitre","published_at":"2010-07-02 20:30:01","updated_at":"2026-04-29 01:13:23"},"problem_types":["CWE-20","n/a"],"metrics":[{"version":"2.0","source":"nvd@nist.gov","type":"Primary","score":"5","severity":"","vector":"AV:N/AC:L/Au:N/C:N/I:N/A:P","data":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"}}],"references":[{"url":"http://secunia.com/advisories/40389","name":"http://secunia.com/advisories/40389","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"],"title":"Qt \"QSslSocketBackendPrivate::transmit()\" Denial of Service Vulnerability - Advisories - Community","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://aluigi.org/poc/qtsslame.zip","name":"http://aluigi.org/poc/qtsslame.zip","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit"],"title":"Direct Link","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securityfocus.com/bid/41250","name":"http://www.securityfocus.com/bid/41250","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit"],"title":"Qt Remote Denial of Service Vulnerability","mime":"text/html","httpstatus":"200","archivestatus":"0"},{"url":"http://osvdb.org/65860","name":"http://osvdb.org/65860","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"","mime":"","httpstatus":"-1","archivestatus":"0"},{"url":"http://aluigi.org/adv/qtsslame-adv.txt","name":"http://aluigi.org/adv/qtsslame-adv.txt","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"","mime":"text/plain","httpstatus":"200","archivestatus":"200"},{"url":"http://www.vupen.com/english/advisories/2010/1657","name":"http://www.vupen.com/english/advisories/2010/1657","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"],"title":"Webmail | OVH- OVH","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://qt.gitorious.org/qt/qt/commit/c25c7c9bdfade6b906f37ac8bad44f6f0de57597","name":"http://qt.gitorious.org/qt/qt/commit/c25c7c9bdfade6b906f37ac8bad44f6f0de57597","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"","mime":"","httpstatus":"-1","archivestatus":"404"},{"url":"https://hermes.opensuse.org/messages/12056605","name":"https://hermes.opensuse.org/messages/12056605","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"","mime":"","httpstatus":"-1","archivestatus":"404"},{"url":"http://secunia.com/advisories/46410","name":"http://secunia.com/advisories/46410","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"],"title":"SUSE update for Qt - Secunia.com","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2010-2621","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2010-2621","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"n/a","product":"n/a","version":"affected n/a","platforms":[]}],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2010","cve_id":"2621","vulnerable":"1","versionEndIncluding":"4.6.3","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"digia","cpe5":"qt","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2010","cve_id":"2621","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"qt","cpe5":"qt","cpe6":"4.0.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2010","cve_id":"2621","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"qt","cpe5":"qt","cpe6":"4.0.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2010","cve_id":"2621","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"qt","cpe5":"qt","cpe6":"4.1.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2010","cve_id":"2621","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"qt","cpe5":"qt","cpe6":"4.1.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2010","cve_id":"2621","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"qt","cpe5":"qt","cpe6":"4.1.2","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2010","cve_id":"2621","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"qt","cpe5":"qt","cpe6":"4.1.3","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2010","cve_id":"2621","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"qt","cpe5":"qt","cpe6":"4.1.4","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2010","cve_id":"2621","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"qt","cpe5":"qt","cpe6":"4.1.5","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2010","cve_id":"2621","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"qt","cpe5":"qt","cpe6":"4.2.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2010","cve_id":"2621","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"qt","cpe5":"qt","cpe6":"4.2.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2010","cve_id":"2621","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"qt","cpe5":"qt","cpe6":"4.2.3","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2010","cve_id":"2621","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"qt","cpe5":"qt","cpe6":"4.3.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2010","cve_id":"2621","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"qt","cpe5":"qt","cpe6":"4.3.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2010","cve_id":"2621","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"qt","cpe5":"qt","cpe6":"4.3.2","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2010","cve_id":"2621","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"qt","cpe5":"qt","cpe6":"4.3.3","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2010","cve_id":"2621","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"qt","cpe5":"qt","cpe6":"4.3.4","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2010","cve_id":"2621","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"qt","cpe5":"qt","cpe6":"4.3.5","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2010","cve_id":"2621","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"qt","cpe5":"qt","cpe6":"4.4.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2010","cve_id":"2621","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"qt","cpe5":"qt","cpe6":"4.4.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2010","cve_id":"2621","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"qt","cpe5":"qt","cpe6":"4.4.2","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2010","cve_id":"2621","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"qt","cpe5":"qt","cpe6":"4.4.3","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2010","cve_id":"2621","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"qt","cpe5":"qt","cpe6":"4.5.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2010","cve_id":"2621","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"qt","cpe5":"qt","cpe6":"4.5.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2010","cve_id":"2621","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"qt","cpe5":"qt","cpe6":"4.5.2","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2010","cve_id":"2621","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"qt","cpe5":"qt","cpe6":"4.5.3","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2010","cve_id":"2621","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"qt","cpe5":"qt","cpe6":"4.6.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2010","cve_id":"2621","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"qt","cpe5":"qt","cpe6":"4.6.0","cpe7":"rc1","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2010","cve_id":"2621","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"qt","cpe5":"qt","cpe6":"4.6.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2010","cve_id":"2621","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"qt","cpe5":"qt","cpe6":"4.6.2","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"adp":[{"providerMetadata":{"dateUpdated":"2024-08-07T02:39:37.809Z","orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE"},"references":[{"name":"46410","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/46410"},{"name":"ADV-2010-1657","tags":["vdb-entry","x_refsource_VUPEN","x_transferred"],"url":"http://www.vupen.com/english/advisories/2010/1657"},{"tags":["x_refsource_MISC","x_transferred"],"url":"http://aluigi.org/poc/qtsslame.zip"},{"name":"41250","tags":["vdb-entry","x_refsource_BID","x_transferred"],"url":"http://www.securityfocus.com/bid/41250"},{"name":"65860","tags":["vdb-entry","x_refsource_OSVDB","x_transferred"],"url":"http://osvdb.org/65860"},{"name":"40389","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/40389"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"http://qt.gitorious.org/qt/qt/commit/c25c7c9bdfade6b906f37ac8bad44f6f0de57597"},{"name":"SUSE-SU-2011:1113","tags":["vendor-advisory","x_refsource_SUSE","x_transferred"],"url":"https://hermes.opensuse.org/messages/12056605"},{"tags":["x_refsource_MISC","x_transferred"],"url":"http://aluigi.org/adv/qtsslame-adv.txt"}],"title":"CVE Program Container"}],"cna":{"affected":[{"product":"n/a","vendor":"n/a","versions":[{"status":"affected","version":"n/a"}]}],"datePublic":"2010-06-29T00:00:00.000Z","descriptions":[{"lang":"en","value":"The QSslSocketBackendPrivate::transmit function in src_network_ssl_qsslsocket_openssl.cpp in Qt 4.6.3 and earlier allows remote attackers to cause a denial of service (infinite loop) via a malformed request."}],"problemTypes":[{"descriptions":[{"description":"n/a","lang":"en","type":"text"}]}],"providerMetadata":{"dateUpdated":"2012-06-19T09:00:00.000Z","orgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","shortName":"mitre"},"references":[{"name":"46410","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/46410"},{"name":"ADV-2010-1657","tags":["vdb-entry","x_refsource_VUPEN"],"url":"http://www.vupen.com/english/advisories/2010/1657"},{"tags":["x_refsource_MISC"],"url":"http://aluigi.org/poc/qtsslame.zip"},{"name":"41250","tags":["vdb-entry","x_refsource_BID"],"url":"http://www.securityfocus.com/bid/41250"},{"name":"65860","tags":["vdb-entry","x_refsource_OSVDB"],"url":"http://osvdb.org/65860"},{"name":"40389","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/40389"},{"tags":["x_refsource_CONFIRM"],"url":"http://qt.gitorious.org/qt/qt/commit/c25c7c9bdfade6b906f37ac8bad44f6f0de57597"},{"name":"SUSE-SU-2011:1113","tags":["vendor-advisory","x_refsource_SUSE"],"url":"https://hermes.opensuse.org/messages/12056605"},{"tags":["x_refsource_MISC"],"url":"http://aluigi.org/adv/qtsslame-adv.txt"}],"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"cve@mitre.org","ID":"CVE-2010-2621","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"The QSslSocketBackendPrivate::transmit function in src_network_ssl_qsslsocket_openssl.cpp in Qt 4.6.3 and earlier allows remote attackers to cause a denial of service (infinite loop) via a malformed request."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"name":"46410","refsource":"SECUNIA","url":"http://secunia.com/advisories/46410"},{"name":"ADV-2010-1657","refsource":"VUPEN","url":"http://www.vupen.com/english/advisories/2010/1657"},{"name":"http://aluigi.org/poc/qtsslame.zip","refsource":"MISC","url":"http://aluigi.org/poc/qtsslame.zip"},{"name":"41250","refsource":"BID","url":"http://www.securityfocus.com/bid/41250"},{"name":"65860","refsource":"OSVDB","url":"http://osvdb.org/65860"},{"name":"40389","refsource":"SECUNIA","url":"http://secunia.com/advisories/40389"},{"name":"http://qt.gitorious.org/qt/qt/commit/c25c7c9bdfade6b906f37ac8bad44f6f0de57597","refsource":"CONFIRM","url":"http://qt.gitorious.org/qt/qt/commit/c25c7c9bdfade6b906f37ac8bad44f6f0de57597"},{"name":"SUSE-SU-2011:1113","refsource":"SUSE","url":"https://hermes.opensuse.org/messages/12056605"},{"name":"http://aluigi.org/adv/qtsslame-adv.txt","refsource":"MISC","url":"http://aluigi.org/adv/qtsslame-adv.txt"}]}}}},"cveMetadata":{"assignerOrgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","assignerShortName":"mitre","cveId":"CVE-2010-2621","datePublished":"2010-07-02T20:00:00.000Z","dateReserved":"2010-07-02T00:00:00.000Z","dateUpdated":"2024-08-07T02:39:37.809Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"},"nvd":{"publishedDate":"2010-07-02 20:30:01","lastModifiedDate":"2026-04-29 01:13:23","problem_types":["CWE-20","n/a"],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:digia:qt:*:*:*:*:*:*:*:*","versionEndIncluding":"4.6.3","matchCriteriaId":"B9AE2922-1C8A-453D-BC5F-5F158DEB8607"},{"vulnerable":true,"criteria":"cpe:2.3:a:qt:qt:4.0.0:*:*:*:*:*:*:*","matchCriteriaId":"C966DAAB-74E1-4594-9CE7-5A1A60F5061E"},{"vulnerable":true,"criteria":"cpe:2.3:a:qt:qt:4.0.1:*:*:*:*:*:*:*","matchCriteriaId":"D51BFA7D-281E-49ED-9A4B-60AD5143C4EF"},{"vulnerable":true,"criteria":"cpe:2.3:a:qt:qt:4.1.0:*:*:*:*:*:*:*","matchCriteriaId":"5A38B91E-698F-4638-BC3B-BD02F3313B70"},{"vulnerable":true,"criteria":"cpe:2.3:a:qt:qt:4.1.1:*:*:*:*:*:*:*","matchCriteriaId":"7629BAB0-5077-4B82-9F11-B228E8EAFA17"},{"vulnerable":true,"criteria":"cpe:2.3:a:qt:qt:4.1.2:*:*:*:*:*:*:*","matchCriteriaId":"76366D45-3604-49D1-BD97-8A9FACEA2171"},{"vulnerable":true,"criteria":"cpe:2.3:a:qt:qt:4.1.3:*:*:*:*:*:*:*","matchCriteriaId":"EEEF60A1-5FF0-465F-A872-62F80899F870"},{"vulnerable":true,"criteria":"cpe:2.3:a:qt:qt:4.1.4:*:*:*:*:*:*:*","matchCriteriaId":"4D5386EE-376B-4773-8687-5314BFF35E41"},{"vulnerable":true,"criteria":"cpe:2.3:a:qt:qt:4.1.5:*:*:*:*:*:*:*","matchCriteriaId":"4ACE447E-BFBC-4059-9786-F8E5F512AEAA"},{"vulnerable":true,"criteria":"cpe:2.3:a:qt:qt:4.2.0:*:*:*:*:*:*:*","matchCriteriaId":"E3AC6465-B459-410E-A5C5-EBFF5C866009"},{"vulnerable":true,"criteria":"cpe:2.3:a:qt:qt:4.2.1:*:*:*:*:*:*:*","matchCriteriaId":"EF48233D-EFFE-40A1-B50A-F2184D9CF325"},{"vulnerable":true,"criteria":"cpe:2.3:a:qt:qt:4.2.3:*:*:*:*:*:*:*","matchCriteriaId":"610017B4-3C0A-4A59-82A1-4E20BCF786E6"},{"vulnerable":true,"criteria":"cpe:2.3:a:qt:qt:4.3.0:*:*:*:*:*:*:*","matchCriteriaId":"D848BD49-3C88-4458-B8AB-AAD8DEB790BD"},{"vulnerable":true,"criteria":"cpe:2.3:a:qt:qt:4.3.1:*:*:*:*:*:*:*","matchCriteriaId":"0A12D978-B6FF-4C67-97D4-91A285C47813"},{"vulnerable":true,"criteria":"cpe:2.3:a:qt:qt:4.3.2:*:*:*:*:*:*:*","matchCriteriaId":"7DBD073E-F3E0-4273-81E9-AF010B711F08"},{"vulnerable":true,"criteria":"cpe:2.3:a:qt:qt:4.3.3:*:*:*:*:*:*:*","matchCriteriaId":"0D58ACBA-7DF3-403A-AC0E-94749383C750"},{"vulnerable":true,"criteria":"cpe:2.3:a:qt:qt:4.3.4:*:*:*:*:*:*:*","matchCriteriaId":"59D6E752-3B2E-4A95-A76A-3326CD490EDD"},{"vulnerable":true,"criteria":"cpe:2.3:a:qt:qt:4.3.5:*:*:*:*:*:*:*","matchCriteriaId":"7A27E4EC-9573-4C82-9B78-244DB0B06FA4"},{"vulnerable":true,"criteria":"cpe:2.3:a:qt:qt:4.4.0:*:*:*:*:*:*:*","matchCriteriaId":"678A25E8-57E3-4E0C-9B24-C68F11F108BA"},{"vulnerable":true,"criteria":"cpe:2.3:a:qt:qt:4.4.1:*:*:*:*:*:*:*","matchCriteriaId":"D16BB8CE-3871-4DFA-84BB-C089894437D2"},{"vulnerable":true,"criteria":"cpe:2.3:a:qt:qt:4.4.2:*:*:*:*:*:*:*","matchCriteriaId":"965B37FD-E22F-4AA7-BDC2-147A9962CFD5"},{"vulnerable":true,"criteria":"cpe:2.3:a:qt:qt:4.4.3:*:*:*:*:*:*:*","matchCriteriaId":"FEE12FD7-2FB2-444A-A660-86294646F8A1"},{"vulnerable":true,"criteria":"cpe:2.3:a:qt:qt:4.5.0:*:*:*:*:*:*:*","matchCriteriaId":"EA4B9F55-4BFF-4FD3-A8BC-842B0467DCD5"},{"vulnerable":true,"criteria":"cpe:2.3:a:qt:qt:4.5.1:*:*:*:*:*:*:*","matchCriteriaId":"9DA805A7-7C62-49FD-B9A2-F81C981691C3"},{"vulnerable":true,"criteria":"cpe:2.3:a:qt:qt:4.5.2:*:*:*:*:*:*:*","matchCriteriaId":"D5596442-5608-439B-8BE6-53A70F20C079"},{"vulnerable":true,"criteria":"cpe:2.3:a:qt:qt:4.5.3:*:*:*:*:*:*:*","matchCriteriaId":"29FD745E-4B61-417F-BC66-386877E75351"},{"vulnerable":true,"criteria":"cpe:2.3:a:qt:qt:4.6.0:*:*:*:*:*:*:*","matchCriteriaId":"2B74E5F5-CEE1-47B1-BE84-7F1C45D4FDD8"},{"vulnerable":true,"criteria":"cpe:2.3:a:qt:qt:4.6.0:rc1:*:*:*:*:*:*","matchCriteriaId":"82A767D8-6194-4ED5-B9BE-2A14541C141F"},{"vulnerable":true,"criteria":"cpe:2.3:a:qt:qt:4.6.1:*:*:*:*:*:*:*","matchCriteriaId":"874E217C-98AC-4F0B-B120-D721164912CD"},{"vulnerable":true,"criteria":"cpe:2.3:a:qt:qt:4.6.2:*:*:*:*:*:*:*","matchCriteriaId":"3051F46B-E301-4DF7-A89B-4E8495617888"}]}]}]},"legacy_mitre":{"record":{"CveYear":"2010","CveId":"2621","Ordinal":"1","Title":"CVE-2010-2621","CVE":"CVE-2010-2621","Year":"2010"},"notes":[{"CveYear":"2010","CveId":"2621","Ordinal":"1","NoteData":"The QSslSocketBackendPrivate::transmit function in src_network_ssl_qsslsocket_openssl.cpp in Qt 4.6.3 and earlier allows remote attackers to cause a denial of service (infinite loop) via a malformed request.","Type":"Description","Title":"CVE-2010-2621"},{"CveYear":"2010","CveId":"2621","Ordinal":"2","NoteData":"2010-07-02","Type":"Other","Title":"Published"},{"CveYear":"2010","CveId":"2621","Ordinal":"3","NoteData":"2012-06-19","Type":"Other","Title":"Modified"}]}}}