Search for vulnerabilities
Vulnerability details: VCID-1zf2-f9w3-aaaj
Vulnerability ID VCID-1zf2-f9w3-aaaj
Aliases CVE-2010-2621
Summary The QSslSocketBackendPrivate::transmit function in src_network_ssl_qsslsocket_openssl.cpp in Qt 4.6.3 and earlier allows remote attackers to cause a denial of service (infinite loop) via a malformed request.
Status Published
Exploitability 2.0
Weighted Severity 4.5
Risk 9.0
Affected and Fixed Packages Package Details
Weaknesses (2)
System Score Found at
epss 0.12574 https://api.first.org/data/v1/epss?cve=CVE-2010-2621
epss 0.12574 https://api.first.org/data/v1/epss?cve=CVE-2010-2621
epss 0.12574 https://api.first.org/data/v1/epss?cve=CVE-2010-2621
epss 0.12574 https://api.first.org/data/v1/epss?cve=CVE-2010-2621
epss 0.12574 https://api.first.org/data/v1/epss?cve=CVE-2010-2621
epss 0.12574 https://api.first.org/data/v1/epss?cve=CVE-2010-2621
epss 0.12574 https://api.first.org/data/v1/epss?cve=CVE-2010-2621
epss 0.12574 https://api.first.org/data/v1/epss?cve=CVE-2010-2621
epss 0.12574 https://api.first.org/data/v1/epss?cve=CVE-2010-2621
epss 0.12574 https://api.first.org/data/v1/epss?cve=CVE-2010-2621
epss 0.12574 https://api.first.org/data/v1/epss?cve=CVE-2010-2621
epss 0.12574 https://api.first.org/data/v1/epss?cve=CVE-2010-2621
epss 0.12574 https://api.first.org/data/v1/epss?cve=CVE-2010-2621
epss 0.12574 https://api.first.org/data/v1/epss?cve=CVE-2010-2621
epss 0.12574 https://api.first.org/data/v1/epss?cve=CVE-2010-2621
epss 0.12574 https://api.first.org/data/v1/epss?cve=CVE-2010-2621
epss 0.12574 https://api.first.org/data/v1/epss?cve=CVE-2010-2621
epss 0.12574 https://api.first.org/data/v1/epss?cve=CVE-2010-2621
epss 0.12574 https://api.first.org/data/v1/epss?cve=CVE-2010-2621
epss 0.12679 https://api.first.org/data/v1/epss?cve=CVE-2010-2621
epss 0.12679 https://api.first.org/data/v1/epss?cve=CVE-2010-2621
epss 0.14104 https://api.first.org/data/v1/epss?cve=CVE-2010-2621
epss 0.14104 https://api.first.org/data/v1/epss?cve=CVE-2010-2621
epss 0.14104 https://api.first.org/data/v1/epss?cve=CVE-2010-2621
epss 0.14104 https://api.first.org/data/v1/epss?cve=CVE-2010-2621
epss 0.14104 https://api.first.org/data/v1/epss?cve=CVE-2010-2621
epss 0.14104 https://api.first.org/data/v1/epss?cve=CVE-2010-2621
epss 0.14104 https://api.first.org/data/v1/epss?cve=CVE-2010-2621
epss 0.14104 https://api.first.org/data/v1/epss?cve=CVE-2010-2621
epss 0.14104 https://api.first.org/data/v1/epss?cve=CVE-2010-2621
epss 0.14104 https://api.first.org/data/v1/epss?cve=CVE-2010-2621
epss 0.14104 https://api.first.org/data/v1/epss?cve=CVE-2010-2621
epss 0.14104 https://api.first.org/data/v1/epss?cve=CVE-2010-2621
epss 0.14104 https://api.first.org/data/v1/epss?cve=CVE-2010-2621
epss 0.14104 https://api.first.org/data/v1/epss?cve=CVE-2010-2621
epss 0.14104 https://api.first.org/data/v1/epss?cve=CVE-2010-2621
epss 0.14104 https://api.first.org/data/v1/epss?cve=CVE-2010-2621
epss 0.14104 https://api.first.org/data/v1/epss?cve=CVE-2010-2621
epss 0.14104 https://api.first.org/data/v1/epss?cve=CVE-2010-2621
epss 0.14104 https://api.first.org/data/v1/epss?cve=CVE-2010-2621
epss 0.14104 https://api.first.org/data/v1/epss?cve=CVE-2010-2621
epss 0.14104 https://api.first.org/data/v1/epss?cve=CVE-2010-2621
epss 0.14104 https://api.first.org/data/v1/epss?cve=CVE-2010-2621
epss 0.14104 https://api.first.org/data/v1/epss?cve=CVE-2010-2621
epss 0.14104 https://api.first.org/data/v1/epss?cve=CVE-2010-2621
epss 0.14104 https://api.first.org/data/v1/epss?cve=CVE-2010-2621
epss 0.14104 https://api.first.org/data/v1/epss?cve=CVE-2010-2621
epss 0.14104 https://api.first.org/data/v1/epss?cve=CVE-2010-2621
epss 0.14104 https://api.first.org/data/v1/epss?cve=CVE-2010-2621
epss 0.14104 https://api.first.org/data/v1/epss?cve=CVE-2010-2621
epss 0.14104 https://api.first.org/data/v1/epss?cve=CVE-2010-2621
epss 0.14104 https://api.first.org/data/v1/epss?cve=CVE-2010-2621
epss 0.14104 https://api.first.org/data/v1/epss?cve=CVE-2010-2621
epss 0.14104 https://api.first.org/data/v1/epss?cve=CVE-2010-2621
epss 0.14104 https://api.first.org/data/v1/epss?cve=CVE-2010-2621
epss 0.14104 https://api.first.org/data/v1/epss?cve=CVE-2010-2621
epss 0.14104 https://api.first.org/data/v1/epss?cve=CVE-2010-2621
epss 0.14104 https://api.first.org/data/v1/epss?cve=CVE-2010-2621
epss 0.14104 https://api.first.org/data/v1/epss?cve=CVE-2010-2621
epss 0.16874 https://api.first.org/data/v1/epss?cve=CVE-2010-2621
epss 0.16874 https://api.first.org/data/v1/epss?cve=CVE-2010-2621
epss 0.16874 https://api.first.org/data/v1/epss?cve=CVE-2010-2621
epss 0.16874 https://api.first.org/data/v1/epss?cve=CVE-2010-2621
epss 0.16874 https://api.first.org/data/v1/epss?cve=CVE-2010-2621
epss 0.16874 https://api.first.org/data/v1/epss?cve=CVE-2010-2621
epss 0.16874 https://api.first.org/data/v1/epss?cve=CVE-2010-2621
epss 0.16874 https://api.first.org/data/v1/epss?cve=CVE-2010-2621
epss 0.16874 https://api.first.org/data/v1/epss?cve=CVE-2010-2621
epss 0.16874 https://api.first.org/data/v1/epss?cve=CVE-2010-2621
epss 0.16874 https://api.first.org/data/v1/epss?cve=CVE-2010-2621
epss 0.26033 https://api.first.org/data/v1/epss?cve=CVE-2010-2621
rhbs low https://bugzilla.redhat.com/show_bug.cgi?id=611086
cvssv2 5.0 https://nvd.nist.gov/vuln/detail/CVE-2010-2621
Reference id Reference type URL
http://aluigi.org/adv/qtsslame-adv.txt
http://aluigi.org/poc/qtsslame.zip
http://osvdb.org/65860
http://qt.gitorious.org/qt/qt/commit/c25c7c9bdfade6b906f37ac8bad44f6f0de57597
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2621.json
https://api.first.org/data/v1/epss?cve=CVE-2010-2621
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2621
http://secunia.com/advisories/40389
http://secunia.com/advisories/46410
https://hermes.opensuse.org/messages/12056605
http://www.securityfocus.com/bid/41250
http://www.vupen.com/english/advisories/2010/1657
587711 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=587711
611086 https://bugzilla.redhat.com/show_bug.cgi?id=611086
cpe:2.3:a:digia:qt:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digia:qt:*:*:*:*:*:*:*:*
cpe:2.3:a:qt:qt:4.0.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qt:qt:4.0.0:*:*:*:*:*:*:*
cpe:2.3:a:qt:qt:4.0.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qt:qt:4.0.1:*:*:*:*:*:*:*
cpe:2.3:a:qt:qt:4.1.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qt:qt:4.1.0:*:*:*:*:*:*:*
cpe:2.3:a:qt:qt:4.1.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qt:qt:4.1.1:*:*:*:*:*:*:*
cpe:2.3:a:qt:qt:4.1.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qt:qt:4.1.2:*:*:*:*:*:*:*
cpe:2.3:a:qt:qt:4.1.3:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qt:qt:4.1.3:*:*:*:*:*:*:*
cpe:2.3:a:qt:qt:4.1.4:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qt:qt:4.1.4:*:*:*:*:*:*:*
cpe:2.3:a:qt:qt:4.1.5:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qt:qt:4.1.5:*:*:*:*:*:*:*
cpe:2.3:a:qt:qt:4.2.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qt:qt:4.2.0:*:*:*:*:*:*:*
cpe:2.3:a:qt:qt:4.2.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qt:qt:4.2.1:*:*:*:*:*:*:*
cpe:2.3:a:qt:qt:4.2.3:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qt:qt:4.2.3:*:*:*:*:*:*:*
cpe:2.3:a:qt:qt:4.3.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qt:qt:4.3.0:*:*:*:*:*:*:*
cpe:2.3:a:qt:qt:4.3.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qt:qt:4.3.1:*:*:*:*:*:*:*
cpe:2.3:a:qt:qt:4.3.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qt:qt:4.3.2:*:*:*:*:*:*:*
cpe:2.3:a:qt:qt:4.3.3:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qt:qt:4.3.3:*:*:*:*:*:*:*
cpe:2.3:a:qt:qt:4.3.4:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qt:qt:4.3.4:*:*:*:*:*:*:*
cpe:2.3:a:qt:qt:4.3.5:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qt:qt:4.3.5:*:*:*:*:*:*:*
cpe:2.3:a:qt:qt:4.4.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qt:qt:4.4.0:*:*:*:*:*:*:*
cpe:2.3:a:qt:qt:4.4.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qt:qt:4.4.1:*:*:*:*:*:*:*
cpe:2.3:a:qt:qt:4.4.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qt:qt:4.4.2:*:*:*:*:*:*:*
cpe:2.3:a:qt:qt:4.4.3:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qt:qt:4.4.3:*:*:*:*:*:*:*
cpe:2.3:a:qt:qt:4.5.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qt:qt:4.5.0:*:*:*:*:*:*:*
cpe:2.3:a:qt:qt:4.5.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qt:qt:4.5.1:*:*:*:*:*:*:*
cpe:2.3:a:qt:qt:4.5.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qt:qt:4.5.2:*:*:*:*:*:*:*
cpe:2.3:a:qt:qt:4.5.3:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qt:qt:4.5.3:*:*:*:*:*:*:*
cpe:2.3:a:qt:qt:4.6.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qt:qt:4.6.0:*:*:*:*:*:*:*
cpe:2.3:a:qt:qt:4.6.0:rc1:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qt:qt:4.6.0:rc1:*:*:*:*:*:*
cpe:2.3:a:qt:qt:4.6.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qt:qt:4.6.1:*:*:*:*:*:*:*
cpe:2.3:a:qt:qt:4.6.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qt:qt:4.6.2:*:*:*:*:*:*:*
CVE-2010-2621 https://nvd.nist.gov/vuln/detail/CVE-2010-2621
CVE-2010-2621;OSVDB-65860 Exploit https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/14268.txt
Data source Exploit-DB
Date added July 8, 2010
Description Qt 4.6.3 - 'QSslSocketBackendPrivate::transmit()' Denial of Service
Ransomware campaign use Known
Source publication date July 8, 2010
Exploit type dos
Platform multiple
Source update date July 8, 2010
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P Found at https://nvd.nist.gov/vuln/detail/CVE-2010-2621
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Exploit Prediction Scoring System (EPSS)
Percentile 0.93569
EPSS Score 0.12574
Published At June 5, 2025, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
There are no relevant records.