{"api_version":"1","generated_at":"2026-05-04T05:53:43+00:00","cve":"CVE-2010-5076","urls":{"html":"https://cve.report/CVE-2010-5076","api":"https://cve.report/api/cve/CVE-2010-5076.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2010-5076","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2010-5076"},"summary":{"title":"CVE-2010-5076","description":"QSslSocket in Qt before 4.7.0-rc1 recognizes a wildcard IP address in the subject's Common Name field of an X.509 certificate, which might allow man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority.","state":"PUBLISHED","assigner":"redhat","published_at":"2012-06-29 19:55:01","updated_at":"2026-04-29 01:13:23"},"problem_types":["CWE-20","n/a"],"metrics":[{"version":"2.0","source":"nvd@nist.gov","type":"Primary","score":"4.3","severity":"","vector":"AV:N/AC:M/Au:N/C:N/I:P/A:N","data":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:N/I:P/A:N","baseScore":4.3,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE"}}],"references":[{"url":"https://bugreports.qt-project.org/browse/QTBUG-4455","name":"https://bugreports.qt-project.org/browse/QTBUG-4455","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"[QTBUG-4455] SSL wildcard verification too broad - Qt Bug Tracker","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.westpoint.ltd.uk/advisories/wp-10-0001.txt","name":"http://www.westpoint.ltd.uk/advisories/wp-10-0001.txt","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"","mime":"text/plain","httpstatus":"200","archivestatus":"200"},{"url":"http://rhn.redhat.com/errata/RHSA-2012-0880.html","name":"http://rhn.redhat.com/errata/RHSA-2012-0880.html","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Red Hat Customer Portal","mime":"text/html","httpstatus":"-1","archivestatus":"200"},{"url":"http://qt.gitorious.org/qt/qt/commit/846f1b44eea4bb34d080d055badb40a4a13d369e","name":"http://qt.gitorious.org/qt/qt/commit/846f1b44eea4bb34d080d055badb40a4a13d369e","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"],"title":"","mime":"","httpstatus":"-1","archivestatus":"404"},{"url":"http://secunia.com/advisories/49895","name":"http://secunia.com/advisories/49895","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"],"title":"Security Advisory SA49895 - Ubuntu update for qt - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/49604","name":"http://secunia.com/advisories/49604","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"],"title":"Security Advisory SA49604 - Red Hat update for qt - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/41236","name":"http://secunia.com/advisories/41236","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"],"title":"Qt SSL Certificate IP Address Wildcard Matching Vulnerability - Advisories - Community","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.ubuntu.com/usn/USN-1504-1","name":"http://www.ubuntu.com/usn/USN-1504-1","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"USN-1504-1: Qt vulnerabilities | Ubuntu","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://qt.gitorious.org/qt/qt/commit/5f6018564668d368f75e431c4cdac88d7421cff0","name":"http://qt.gitorious.org/qt/qt/commit/5f6018564668d368f75e431c4cdac88d7421cff0","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Patch"],"title":"","mime":"","httpstatus":"-1","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2010-5076","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2010-5076","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"n/a","product":"n/a","version":"affected n/a","platforms":[]}],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2010","cve_id":"5076","vulnerable":"1","versionEndIncluding":"4.6.4","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"digia","cpe5":"qt","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2010","cve_id":"5076","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"qt","cpe5":"qt","cpe6":"4.0.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2010","cve_id":"5076","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"qt","cpe5":"qt","cpe6":"4.0.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2010","cve_id":"5076","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"qt","cpe5":"qt","cpe6":"4.1.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2010","cve_id":"5076","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"qt","cpe5":"qt","cpe6":"4.1.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2010","cve_id":"5076","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"qt","cpe5":"qt","cpe6":"4.1.2","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2010","cve_id":"5076","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"qt","cpe5":"qt","cpe6":"4.1.3","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2010","cve_id":"5076","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"qt","cpe5":"qt","cpe6":"4.1.4","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2010","cve_id":"5076","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"qt","cpe5":"qt","cpe6":"4.1.5","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2010","cve_id":"5076","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"qt","cpe5":"qt","cpe6":"4.2.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2010","cve_id":"5076","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"qt","cpe5":"qt","cpe6":"4.2.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2010","cve_id":"5076","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"qt","cpe5":"qt","cpe6":"4.2.3","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2010","cve_id":"5076","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"qt","cpe5":"qt","cpe6":"4.3.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2010","cve_id":"5076","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"qt","cpe5":"qt","cpe6":"4.3.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2010","cve_id":"5076","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"qt","cpe5":"qt","cpe6":"4.3.2","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2010","cve_id":"5076","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"qt","cpe5":"qt","cpe6":"4.3.3","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2010","cve_id":"5076","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"qt","cpe5":"qt","cpe6":"4.3.4","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2010","cve_id":"5076","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"qt","cpe5":"qt","cpe6":"4.3.5","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2010","cve_id":"5076","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"qt","cpe5":"qt","cpe6":"4.4.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2010","cve_id":"5076","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"qt","cpe5":"qt","cpe6":"4.4.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2010","cve_id":"5076","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"qt","cpe5":"qt","cpe6":"4.4.2","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2010","cve_id":"5076","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"qt","cpe5":"qt","cpe6":"4.4.3","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2010","cve_id":"5076","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"qt","cpe5":"qt","cpe6":"4.5.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2010","cve_id":"5076","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"qt","cpe5":"qt","cpe6":"4.5.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2010","cve_id":"5076","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"qt","cpe5":"qt","cpe6":"4.5.2","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2010","cve_id":"5076","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"qt","cpe5":"qt","cpe6":"4.5.3","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2010","cve_id":"5076","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"qt","cpe5":"qt","cpe6":"4.6.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2010","cve_id":"5076","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"qt","cpe5":"qt","cpe6":"4.6.0","cpe7":"rc1","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2010","cve_id":"5076","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"qt","cpe5":"qt","cpe6":"4.6.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2010","cve_id":"5076","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"qt","cpe5":"qt","cpe6":"4.6.2","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2010","cve_id":"5076","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"qt","cpe5":"qt","cpe6":"4.6.3","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"adp":[{"providerMetadata":{"dateUpdated":"2024-08-07T04:09:38.930Z","orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE"},"references":[{"name":"USN-1504-1","tags":["vendor-advisory","x_refsource_UBUNTU","x_transferred"],"url":"http://www.ubuntu.com/usn/USN-1504-1"},{"name":"49895","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/49895"},{"name":"RHSA-2012:0880","tags":["vendor-advisory","x_refsource_REDHAT","x_transferred"],"url":"http://rhn.redhat.com/errata/RHSA-2012-0880.html"},{"name":"41236","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/41236"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"http://qt.gitorious.org/qt/qt/commit/846f1b44eea4bb34d080d055badb40a4a13d369e"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"http://qt.gitorious.org/qt/qt/commit/5f6018564668d368f75e431c4cdac88d7421cff0"},{"name":"49604","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/49604"},{"tags":["x_refsource_MISC","x_transferred"],"url":"http://www.westpoint.ltd.uk/advisories/wp-10-0001.txt"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://bugreports.qt-project.org/browse/QTBUG-4455"}],"title":"CVE Program Container"}],"cna":{"affected":[{"product":"n/a","vendor":"n/a","versions":[{"status":"affected","version":"n/a"}]}],"datePublic":"2010-07-14T00:00:00.000Z","descriptions":[{"lang":"en","value":"QSslSocket in Qt before 4.7.0-rc1 recognizes a wildcard IP address in the subject's Common Name field of an X.509 certificate, which might allow man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority."}],"problemTypes":[{"descriptions":[{"description":"n/a","lang":"en","type":"text"}]}],"providerMetadata":{"dateUpdated":"2012-08-16T09:00:00.000Z","orgId":"53f830b8-0a3f-465b-8143-3b8a9948e749","shortName":"redhat"},"references":[{"name":"USN-1504-1","tags":["vendor-advisory","x_refsource_UBUNTU"],"url":"http://www.ubuntu.com/usn/USN-1504-1"},{"name":"49895","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/49895"},{"name":"RHSA-2012:0880","tags":["vendor-advisory","x_refsource_REDHAT"],"url":"http://rhn.redhat.com/errata/RHSA-2012-0880.html"},{"name":"41236","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/41236"},{"tags":["x_refsource_CONFIRM"],"url":"http://qt.gitorious.org/qt/qt/commit/846f1b44eea4bb34d080d055badb40a4a13d369e"},{"tags":["x_refsource_CONFIRM"],"url":"http://qt.gitorious.org/qt/qt/commit/5f6018564668d368f75e431c4cdac88d7421cff0"},{"name":"49604","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/49604"},{"tags":["x_refsource_MISC"],"url":"http://www.westpoint.ltd.uk/advisories/wp-10-0001.txt"},{"tags":["x_refsource_CONFIRM"],"url":"https://bugreports.qt-project.org/browse/QTBUG-4455"}]}},"cveMetadata":{"assignerOrgId":"53f830b8-0a3f-465b-8143-3b8a9948e749","assignerShortName":"redhat","cveId":"CVE-2010-5076","datePublished":"2012-06-29T19:00:00.000Z","dateReserved":"2011-12-19T00:00:00.000Z","dateUpdated":"2024-08-07T04:09:38.930Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"},"nvd":{"publishedDate":"2012-06-29 19:55:01","lastModifiedDate":"2026-04-29 01:13:23","problem_types":["CWE-20","n/a"],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:N/I:P/A:N","baseScore":4.3,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":8.6,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:digia:qt:*:*:*:*:*:*:*:*","versionEndIncluding":"4.6.4","matchCriteriaId":"C5547662-C2D8-48C6-B1A5-7F929772EAA9"},{"vulnerable":true,"criteria":"cpe:2.3:a:qt:qt:4.0.0:*:*:*:*:*:*:*","matchCriteriaId":"C966DAAB-74E1-4594-9CE7-5A1A60F5061E"},{"vulnerable":true,"criteria":"cpe:2.3:a:qt:qt:4.0.1:*:*:*:*:*:*:*","matchCriteriaId":"D51BFA7D-281E-49ED-9A4B-60AD5143C4EF"},{"vulnerable":true,"criteria":"cpe:2.3:a:qt:qt:4.1.0:*:*:*:*:*:*:*","matchCriteriaId":"5A38B91E-698F-4638-BC3B-BD02F3313B70"},{"vulnerable":true,"criteria":"cpe:2.3:a:qt:qt:4.1.1:*:*:*:*:*:*:*","matchCriteriaId":"7629BAB0-5077-4B82-9F11-B228E8EAFA17"},{"vulnerable":true,"criteria":"cpe:2.3:a:qt:qt:4.1.2:*:*:*:*:*:*:*","matchCriteriaId":"76366D45-3604-49D1-BD97-8A9FACEA2171"},{"vulnerable":true,"criteria":"cpe:2.3:a:qt:qt:4.1.3:*:*:*:*:*:*:*","matchCriteriaId":"EEEF60A1-5FF0-465F-A872-62F80899F870"},{"vulnerable":true,"criteria":"cpe:2.3:a:qt:qt:4.1.4:*:*:*:*:*:*:*","matchCriteriaId":"4D5386EE-376B-4773-8687-5314BFF35E41"},{"vulnerable":true,"criteria":"cpe:2.3:a:qt:qt:4.1.5:*:*:*:*:*:*:*","matchCriteriaId":"4ACE447E-BFBC-4059-9786-F8E5F512AEAA"},{"vulnerable":true,"criteria":"cpe:2.3:a:qt:qt:4.2.0:*:*:*:*:*:*:*","matchCriteriaId":"E3AC6465-B459-410E-A5C5-EBFF5C866009"},{"vulnerable":true,"criteria":"cpe:2.3:a:qt:qt:4.2.1:*:*:*:*:*:*:*","matchCriteriaId":"EF48233D-EFFE-40A1-B50A-F2184D9CF325"},{"vulnerable":true,"criteria":"cpe:2.3:a:qt:qt:4.2.3:*:*:*:*:*:*:*","matchCriteriaId":"610017B4-3C0A-4A59-82A1-4E20BCF786E6"},{"vulnerable":true,"criteria":"cpe:2.3:a:qt:qt:4.3.0:*:*:*:*:*:*:*","matchCriteriaId":"D848BD49-3C88-4458-B8AB-AAD8DEB790BD"},{"vulnerable":true,"criteria":"cpe:2.3:a:qt:qt:4.3.1:*:*:*:*:*:*:*","matchCriteriaId":"0A12D978-B6FF-4C67-97D4-91A285C47813"},{"vulnerable":true,"criteria":"cpe:2.3:a:qt:qt:4.3.2:*:*:*:*:*:*:*","matchCriteriaId":"7DBD073E-F3E0-4273-81E9-AF010B711F08"},{"vulnerable":true,"criteria":"cpe:2.3:a:qt:qt:4.3.3:*:*:*:*:*:*:*","matchCriteriaId":"0D58ACBA-7DF3-403A-AC0E-94749383C750"},{"vulnerable":true,"criteria":"cpe:2.3:a:qt:qt:4.3.4:*:*:*:*:*:*:*","matchCriteriaId":"59D6E752-3B2E-4A95-A76A-3326CD490EDD"},{"vulnerable":true,"criteria":"cpe:2.3:a:qt:qt:4.3.5:*:*:*:*:*:*:*","matchCriteriaId":"7A27E4EC-9573-4C82-9B78-244DB0B06FA4"},{"vulnerable":true,"criteria":"cpe:2.3:a:qt:qt:4.4.0:*:*:*:*:*:*:*","matchCriteriaId":"678A25E8-57E3-4E0C-9B24-C68F11F108BA"},{"vulnerable":true,"criteria":"cpe:2.3:a:qt:qt:4.4.1:*:*:*:*:*:*:*","matchCriteriaId":"D16BB8CE-3871-4DFA-84BB-C089894437D2"},{"vulnerable":true,"criteria":"cpe:2.3:a:qt:qt:4.4.2:*:*:*:*:*:*:*","matchCriteriaId":"965B37FD-E22F-4AA7-BDC2-147A9962CFD5"},{"vulnerable":true,"criteria":"cpe:2.3:a:qt:qt:4.4.3:*:*:*:*:*:*:*","matchCriteriaId":"FEE12FD7-2FB2-444A-A660-86294646F8A1"},{"vulnerable":true,"criteria":"cpe:2.3:a:qt:qt:4.5.0:*:*:*:*:*:*:*","matchCriteriaId":"EA4B9F55-4BFF-4FD3-A8BC-842B0467DCD5"},{"vulnerable":true,"criteria":"cpe:2.3:a:qt:qt:4.5.1:*:*:*:*:*:*:*","matchCriteriaId":"9DA805A7-7C62-49FD-B9A2-F81C981691C3"},{"vulnerable":true,"criteria":"cpe:2.3:a:qt:qt:4.5.2:*:*:*:*:*:*:*","matchCriteriaId":"D5596442-5608-439B-8BE6-53A70F20C079"},{"vulnerable":true,"criteria":"cpe:2.3:a:qt:qt:4.5.3:*:*:*:*:*:*:*","matchCriteriaId":"29FD745E-4B61-417F-BC66-386877E75351"},{"vulnerable":true,"criteria":"cpe:2.3:a:qt:qt:4.6.0:*:*:*:*:*:*:*","matchCriteriaId":"2B74E5F5-CEE1-47B1-BE84-7F1C45D4FDD8"},{"vulnerable":true,"criteria":"cpe:2.3:a:qt:qt:4.6.0:rc1:*:*:*:*:*:*","matchCriteriaId":"82A767D8-6194-4ED5-B9BE-2A14541C141F"},{"vulnerable":true,"criteria":"cpe:2.3:a:qt:qt:4.6.1:*:*:*:*:*:*:*","matchCriteriaId":"874E217C-98AC-4F0B-B120-D721164912CD"},{"vulnerable":true,"criteria":"cpe:2.3:a:qt:qt:4.6.2:*:*:*:*:*:*:*","matchCriteriaId":"3051F46B-E301-4DF7-A89B-4E8495617888"},{"vulnerable":true,"criteria":"cpe:2.3:a:qt:qt:4.6.3:*:*:*:*:*:*:*","matchCriteriaId":"0C8BED3D-E6E9-4A7F-A186-DD7DC20706D1"}]}]}]},"legacy_mitre":{"record":{"CveYear":"2010","CveId":"5076","Ordinal":"1","Title":"CVE-2010-5076","CVE":"CVE-2010-5076","Year":"2010"},"notes":[{"CveYear":"2010","CveId":"5076","Ordinal":"1","NoteData":"QSslSocket in Qt before 4.7.0-rc1 recognizes a wildcard IP address in the subject's Common Name field of an X.509 certificate, which might allow man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority.","Type":"Description","Title":"CVE-2010-5076"},{"CveYear":"2010","CveId":"5076","Ordinal":"2","NoteData":"2012-06-29","Type":"Other","Title":"Published"},{"CveYear":"2010","CveId":"5076","Ordinal":"3","NoteData":"2012-08-16","Type":"Other","Title":"Modified"}]}}}