Refine your search

4 vulnerabilities found for Qt by The Qt Company

CVE-2025-12385 (GCVE-0-2025-12385)
Vulnerability from nvd
Published
2025-12-03 19:38
Modified
2025-12-03 21:46
CWE
  • CWE-770 - Allocation of Resources Without Limits or Throttling
  • CWE-1284 - Improper Validation of Specified Quantity in Input
Summary
Allocation of Resources Without Limits or Throttling, Improper Validation of Specified Quantity in Input vulnerability in The Qt Company Qt on Windows, MacOS, Linux, iOS, Android, x86, ARM, 64 bit, 32 bit allows Excessive Allocation. This issue affects users of the Text component in Qt Quick. Missing validation of the width and height in the <img> tag could cause an application to become unresponsive. This issue affects Qt: from 5.0.0 through 6.5.10, from 6.6.0 through 6.8.5, from 6.9.0 through 6.10.0.
Impacted products
Vendor Product Version
The Qt Company Qt Version: 5.0.0
Version: 6.6.0
Version: 6.9.0
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-12385",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-12-03T21:46:27.767155Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-12-03T21:46:42.476Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "platforms": [
            "Windows",
            "MacOS",
            "Linux",
            "iOS",
            "Android",
            "x86",
            "ARM",
            "64 bit",
            "32 bit"
          ],
          "product": "Qt",
          "vendor": "The Qt Company",
          "versions": [
            {
              "lessThanOrEqual": "6.5.10",
              "status": "affected",
              "version": "5.0.0",
              "versionType": "python"
            },
            {
              "lessThanOrEqual": "6.8.5",
              "status": "affected",
              "version": "6.6.0",
              "versionType": "python"
            },
            {
              "lessThanOrEqual": "6.10.0",
              "status": "affected",
              "version": "6.9.0",
              "versionType": "python"
            }
          ]
        }
      ],
      "cpeApplicability": [
        {
          "nodes": [
            {
              "cpeMatch": [
                {
                  "criteria": "cpe:2.3:a:the_qt_company:qt:*:*:windows:*:*:*:*:*",
                  "versionEndIncluding": "6.5.10",
                  "versionStartIncluding": "5.0.0",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:a:the_qt_company:qt:*:*:macos:*:*:*:*:*",
                  "versionEndIncluding": "6.5.10",
                  "versionStartIncluding": "5.0.0",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:a:the_qt_company:qt:*:*:linux:*:*:*:*:*",
                  "versionEndIncluding": "6.5.10",
                  "versionStartIncluding": "5.0.0",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:a:the_qt_company:qt:*:*:ios:*:*:*:*:*",
                  "versionEndIncluding": "6.5.10",
                  "versionStartIncluding": "5.0.0",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:a:the_qt_company:qt:*:*:android:*:*:*:*:*",
                  "versionEndIncluding": "6.5.10",
                  "versionStartIncluding": "5.0.0",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:a:the_qt_company:qt:*:*:x86:*:*:*:*:*",
                  "versionEndIncluding": "6.5.10",
                  "versionStartIncluding": "5.0.0",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:a:the_qt_company:qt:*:*:arm:*:*:*:*:*",
                  "versionEndIncluding": "6.5.10",
                  "versionStartIncluding": "5.0.0",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:a:the_qt_company:qt:*:*:64_bit:*:*:*:*:*",
                  "versionEndIncluding": "6.5.10",
                  "versionStartIncluding": "5.0.0",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:a:the_qt_company:qt:*:*:32_bit:*:*:*:*:*",
                  "versionEndIncluding": "6.5.10",
                  "versionStartIncluding": "5.0.0",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:a:the_qt_company:qt:*:*:windows:*:*:*:*:*",
                  "versionEndIncluding": "6.8.5",
                  "versionStartIncluding": "6.6.0",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:a:the_qt_company:qt:*:*:macos:*:*:*:*:*",
                  "versionEndIncluding": "6.8.5",
                  "versionStartIncluding": "6.6.0",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:a:the_qt_company:qt:*:*:linux:*:*:*:*:*",
                  "versionEndIncluding": "6.8.5",
                  "versionStartIncluding": "6.6.0",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:a:the_qt_company:qt:*:*:ios:*:*:*:*:*",
                  "versionEndIncluding": "6.8.5",
                  "versionStartIncluding": "6.6.0",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:a:the_qt_company:qt:*:*:android:*:*:*:*:*",
                  "versionEndIncluding": "6.8.5",
                  "versionStartIncluding": "6.6.0",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:a:the_qt_company:qt:*:*:x86:*:*:*:*:*",
                  "versionEndIncluding": "6.8.5",
                  "versionStartIncluding": "6.6.0",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:a:the_qt_company:qt:*:*:arm:*:*:*:*:*",
                  "versionEndIncluding": "6.8.5",
                  "versionStartIncluding": "6.6.0",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:a:the_qt_company:qt:*:*:64_bit:*:*:*:*:*",
                  "versionEndIncluding": "6.8.5",
                  "versionStartIncluding": "6.6.0",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:a:the_qt_company:qt:*:*:32_bit:*:*:*:*:*",
                  "versionEndIncluding": "6.8.5",
                  "versionStartIncluding": "6.6.0",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:a:the_qt_company:qt:*:*:windows:*:*:*:*:*",
                  "versionEndIncluding": "6.10.0",
                  "versionStartIncluding": "6.9.0",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:a:the_qt_company:qt:*:*:macos:*:*:*:*:*",
                  "versionEndIncluding": "6.10.0",
                  "versionStartIncluding": "6.9.0",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:a:the_qt_company:qt:*:*:linux:*:*:*:*:*",
                  "versionEndIncluding": "6.10.0",
                  "versionStartIncluding": "6.9.0",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:a:the_qt_company:qt:*:*:ios:*:*:*:*:*",
                  "versionEndIncluding": "6.10.0",
                  "versionStartIncluding": "6.9.0",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:a:the_qt_company:qt:*:*:android:*:*:*:*:*",
                  "versionEndIncluding": "6.10.0",
                  "versionStartIncluding": "6.9.0",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:a:the_qt_company:qt:*:*:x86:*:*:*:*:*",
                  "versionEndIncluding": "6.10.0",
                  "versionStartIncluding": "6.9.0",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:a:the_qt_company:qt:*:*:arm:*:*:*:*:*",
                  "versionEndIncluding": "6.10.0",
                  "versionStartIncluding": "6.9.0",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:a:the_qt_company:qt:*:*:64_bit:*:*:*:*:*",
                  "versionEndIncluding": "6.10.0",
                  "versionStartIncluding": "6.9.0",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:a:the_qt_company:qt:*:*:32_bit:*:*:*:*:*",
                  "versionEndIncluding": "6.10.0",
                  "versionStartIncluding": "6.9.0",
                  "vulnerable": true
                }
              ],
              "negate": false,
              "operator": "OR"
            }
          ],
          "operator": "OR"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Allocation of Resources Without Limits or Throttling, Improper Validation of Specified Quantity in Input vulnerability in The Qt Company Qt on Windows, MacOS, Linux, iOS, Android, x86, ARM, 64 bit, 32 bit allows Excessive Allocation.\u003cbr\u003e\u003cp\u003eThis issue affects users of the Text component in Qt Quick. Missing validation of the width and height in the \u0026lt;img\u0026gt; tag could cause an application to become unresponsive.\u003c/p\u003e\u003cp\u003eThis issue affects Qt: from 5.0.0 through 6.5.10, from 6.6.0 through 6.8.5, from 6.9.0 through 6.10.0.\u003c/p\u003e"
            }
          ],
          "value": "Allocation of Resources Without Limits or Throttling, Improper Validation of Specified Quantity in Input vulnerability in The Qt Company Qt on Windows, MacOS, Linux, iOS, Android, x86, ARM, 64 bit, 32 bit allows Excessive Allocation.\nThis issue affects users of the Text component in Qt Quick. Missing validation of the width and height in the \u003cimg\u003e tag could cause an application to become unresponsive.\n\nThis issue affects Qt: from 5.0.0 through 6.5.10, from 6.6.0 through 6.8.5, from 6.9.0 through 6.10.0."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-130",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-130 Excessive Allocation"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV4_0": {
            "Automatable": "NOT_DEFINED",
            "Recovery": "NOT_DEFINED",
            "Safety": "NOT_DEFINED",
            "attackComplexity": "LOW",
            "attackRequirements": "NONE",
            "attackVector": "NETWORK",
            "baseScore": 8.7,
            "baseSeverity": "HIGH",
            "exploitMaturity": "NOT_DEFINED",
            "privilegesRequired": "NONE",
            "providerUrgency": "NOT_DEFINED",
            "subAvailabilityImpact": "NONE",
            "subConfidentialityImpact": "NONE",
            "subIntegrityImpact": "NONE",
            "userInteraction": "NONE",
            "valueDensity": "NOT_DEFINED",
            "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
            "version": "4.0",
            "vulnAvailabilityImpact": "HIGH",
            "vulnConfidentialityImpact": "NONE",
            "vulnIntegrityImpact": "NONE",
            "vulnerabilityResponseEffort": "NOT_DEFINED"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-770",
              "description": "CWE-770 Allocation of Resources Without Limits or Throttling",
              "lang": "en",
              "type": "CWE"
            }
          ]
        },
        {
          "descriptions": [
            {
              "cweId": "CWE-1284",
              "description": "CWE-1284 Improper Validation of Specified Quantity in Input",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-12-03T19:38:53.130Z",
        "orgId": "a59d8014-47c4-4630-ab43-e1b13cbe58e3",
        "shortName": "TQtC"
      },
      "references": [
        {
          "url": "https://codereview.qt-project.org/c/qt/qtdeclarative/+/687239"
        },
        {
          "url": "https://codereview.qt-project.org/c/qt/qtdeclarative/+/687766"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "title": "Improper validation of \u003cimg\u003e tag size in Text component parser",
      "x_generator": {
        "engine": "Vulnogram 0.4.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "a59d8014-47c4-4630-ab43-e1b13cbe58e3",
    "assignerShortName": "TQtC",
    "cveId": "CVE-2025-12385",
    "datePublished": "2025-12-03T19:38:53.130Z",
    "dateReserved": "2025-10-28T11:53:25.141Z",
    "dateUpdated": "2025-12-03T21:46:42.476Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2025-12385 (GCVE-0-2025-12385)
Vulnerability from cvelistv5
Published
2025-12-03 19:38
Modified
2025-12-03 21:46
CWE
  • CWE-770 - Allocation of Resources Without Limits or Throttling
  • CWE-1284 - Improper Validation of Specified Quantity in Input
Summary
Allocation of Resources Without Limits or Throttling, Improper Validation of Specified Quantity in Input vulnerability in The Qt Company Qt on Windows, MacOS, Linux, iOS, Android, x86, ARM, 64 bit, 32 bit allows Excessive Allocation. This issue affects users of the Text component in Qt Quick. Missing validation of the width and height in the <img> tag could cause an application to become unresponsive. This issue affects Qt: from 5.0.0 through 6.5.10, from 6.6.0 through 6.8.5, from 6.9.0 through 6.10.0.
Impacted products
Vendor Product Version
The Qt Company Qt Version: 5.0.0
Version: 6.6.0
Version: 6.9.0
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-12385",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-12-03T21:46:27.767155Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-12-03T21:46:42.476Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "platforms": [
            "Windows",
            "MacOS",
            "Linux",
            "iOS",
            "Android",
            "x86",
            "ARM",
            "64 bit",
            "32 bit"
          ],
          "product": "Qt",
          "vendor": "The Qt Company",
          "versions": [
            {
              "lessThanOrEqual": "6.5.10",
              "status": "affected",
              "version": "5.0.0",
              "versionType": "python"
            },
            {
              "lessThanOrEqual": "6.8.5",
              "status": "affected",
              "version": "6.6.0",
              "versionType": "python"
            },
            {
              "lessThanOrEqual": "6.10.0",
              "status": "affected",
              "version": "6.9.0",
              "versionType": "python"
            }
          ]
        }
      ],
      "cpeApplicability": [
        {
          "nodes": [
            {
              "cpeMatch": [
                {
                  "criteria": "cpe:2.3:a:the_qt_company:qt:*:*:windows:*:*:*:*:*",
                  "versionEndIncluding": "6.5.10",
                  "versionStartIncluding": "5.0.0",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:a:the_qt_company:qt:*:*:macos:*:*:*:*:*",
                  "versionEndIncluding": "6.5.10",
                  "versionStartIncluding": "5.0.0",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:a:the_qt_company:qt:*:*:linux:*:*:*:*:*",
                  "versionEndIncluding": "6.5.10",
                  "versionStartIncluding": "5.0.0",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:a:the_qt_company:qt:*:*:ios:*:*:*:*:*",
                  "versionEndIncluding": "6.5.10",
                  "versionStartIncluding": "5.0.0",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:a:the_qt_company:qt:*:*:android:*:*:*:*:*",
                  "versionEndIncluding": "6.5.10",
                  "versionStartIncluding": "5.0.0",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:a:the_qt_company:qt:*:*:x86:*:*:*:*:*",
                  "versionEndIncluding": "6.5.10",
                  "versionStartIncluding": "5.0.0",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:a:the_qt_company:qt:*:*:arm:*:*:*:*:*",
                  "versionEndIncluding": "6.5.10",
                  "versionStartIncluding": "5.0.0",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:a:the_qt_company:qt:*:*:64_bit:*:*:*:*:*",
                  "versionEndIncluding": "6.5.10",
                  "versionStartIncluding": "5.0.0",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:a:the_qt_company:qt:*:*:32_bit:*:*:*:*:*",
                  "versionEndIncluding": "6.5.10",
                  "versionStartIncluding": "5.0.0",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:a:the_qt_company:qt:*:*:windows:*:*:*:*:*",
                  "versionEndIncluding": "6.8.5",
                  "versionStartIncluding": "6.6.0",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:a:the_qt_company:qt:*:*:macos:*:*:*:*:*",
                  "versionEndIncluding": "6.8.5",
                  "versionStartIncluding": "6.6.0",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:a:the_qt_company:qt:*:*:linux:*:*:*:*:*",
                  "versionEndIncluding": "6.8.5",
                  "versionStartIncluding": "6.6.0",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:a:the_qt_company:qt:*:*:ios:*:*:*:*:*",
                  "versionEndIncluding": "6.8.5",
                  "versionStartIncluding": "6.6.0",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:a:the_qt_company:qt:*:*:android:*:*:*:*:*",
                  "versionEndIncluding": "6.8.5",
                  "versionStartIncluding": "6.6.0",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:a:the_qt_company:qt:*:*:x86:*:*:*:*:*",
                  "versionEndIncluding": "6.8.5",
                  "versionStartIncluding": "6.6.0",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:a:the_qt_company:qt:*:*:arm:*:*:*:*:*",
                  "versionEndIncluding": "6.8.5",
                  "versionStartIncluding": "6.6.0",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:a:the_qt_company:qt:*:*:64_bit:*:*:*:*:*",
                  "versionEndIncluding": "6.8.5",
                  "versionStartIncluding": "6.6.0",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:a:the_qt_company:qt:*:*:32_bit:*:*:*:*:*",
                  "versionEndIncluding": "6.8.5",
                  "versionStartIncluding": "6.6.0",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:a:the_qt_company:qt:*:*:windows:*:*:*:*:*",
                  "versionEndIncluding": "6.10.0",
                  "versionStartIncluding": "6.9.0",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:a:the_qt_company:qt:*:*:macos:*:*:*:*:*",
                  "versionEndIncluding": "6.10.0",
                  "versionStartIncluding": "6.9.0",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:a:the_qt_company:qt:*:*:linux:*:*:*:*:*",
                  "versionEndIncluding": "6.10.0",
                  "versionStartIncluding": "6.9.0",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:a:the_qt_company:qt:*:*:ios:*:*:*:*:*",
                  "versionEndIncluding": "6.10.0",
                  "versionStartIncluding": "6.9.0",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:a:the_qt_company:qt:*:*:android:*:*:*:*:*",
                  "versionEndIncluding": "6.10.0",
                  "versionStartIncluding": "6.9.0",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:a:the_qt_company:qt:*:*:x86:*:*:*:*:*",
                  "versionEndIncluding": "6.10.0",
                  "versionStartIncluding": "6.9.0",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:a:the_qt_company:qt:*:*:arm:*:*:*:*:*",
                  "versionEndIncluding": "6.10.0",
                  "versionStartIncluding": "6.9.0",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:a:the_qt_company:qt:*:*:64_bit:*:*:*:*:*",
                  "versionEndIncluding": "6.10.0",
                  "versionStartIncluding": "6.9.0",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:a:the_qt_company:qt:*:*:32_bit:*:*:*:*:*",
                  "versionEndIncluding": "6.10.0",
                  "versionStartIncluding": "6.9.0",
                  "vulnerable": true
                }
              ],
              "negate": false,
              "operator": "OR"
            }
          ],
          "operator": "OR"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Allocation of Resources Without Limits or Throttling, Improper Validation of Specified Quantity in Input vulnerability in The Qt Company Qt on Windows, MacOS, Linux, iOS, Android, x86, ARM, 64 bit, 32 bit allows Excessive Allocation.\u003cbr\u003e\u003cp\u003eThis issue affects users of the Text component in Qt Quick. Missing validation of the width and height in the \u0026lt;img\u0026gt; tag could cause an application to become unresponsive.\u003c/p\u003e\u003cp\u003eThis issue affects Qt: from 5.0.0 through 6.5.10, from 6.6.0 through 6.8.5, from 6.9.0 through 6.10.0.\u003c/p\u003e"
            }
          ],
          "value": "Allocation of Resources Without Limits or Throttling, Improper Validation of Specified Quantity in Input vulnerability in The Qt Company Qt on Windows, MacOS, Linux, iOS, Android, x86, ARM, 64 bit, 32 bit allows Excessive Allocation.\nThis issue affects users of the Text component in Qt Quick. Missing validation of the width and height in the \u003cimg\u003e tag could cause an application to become unresponsive.\n\nThis issue affects Qt: from 5.0.0 through 6.5.10, from 6.6.0 through 6.8.5, from 6.9.0 through 6.10.0."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-130",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-130 Excessive Allocation"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV4_0": {
            "Automatable": "NOT_DEFINED",
            "Recovery": "NOT_DEFINED",
            "Safety": "NOT_DEFINED",
            "attackComplexity": "LOW",
            "attackRequirements": "NONE",
            "attackVector": "NETWORK",
            "baseScore": 8.7,
            "baseSeverity": "HIGH",
            "exploitMaturity": "NOT_DEFINED",
            "privilegesRequired": "NONE",
            "providerUrgency": "NOT_DEFINED",
            "subAvailabilityImpact": "NONE",
            "subConfidentialityImpact": "NONE",
            "subIntegrityImpact": "NONE",
            "userInteraction": "NONE",
            "valueDensity": "NOT_DEFINED",
            "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
            "version": "4.0",
            "vulnAvailabilityImpact": "HIGH",
            "vulnConfidentialityImpact": "NONE",
            "vulnIntegrityImpact": "NONE",
            "vulnerabilityResponseEffort": "NOT_DEFINED"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-770",
              "description": "CWE-770 Allocation of Resources Without Limits or Throttling",
              "lang": "en",
              "type": "CWE"
            }
          ]
        },
        {
          "descriptions": [
            {
              "cweId": "CWE-1284",
              "description": "CWE-1284 Improper Validation of Specified Quantity in Input",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-12-03T19:38:53.130Z",
        "orgId": "a59d8014-47c4-4630-ab43-e1b13cbe58e3",
        "shortName": "TQtC"
      },
      "references": [
        {
          "url": "https://codereview.qt-project.org/c/qt/qtdeclarative/+/687239"
        },
        {
          "url": "https://codereview.qt-project.org/c/qt/qtdeclarative/+/687766"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "title": "Improper validation of \u003cimg\u003e tag size in Text component parser",
      "x_generator": {
        "engine": "Vulnogram 0.4.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "a59d8014-47c4-4630-ab43-e1b13cbe58e3",
    "assignerShortName": "TQtC",
    "cveId": "CVE-2025-12385",
    "datePublished": "2025-12-03T19:38:53.130Z",
    "dateReserved": "2025-10-28T11:53:25.141Z",
    "dateUpdated": "2025-12-03T21:46:42.476Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

jvndb-2017-000247
Vulnerability from jvndb
Published
2017-12-11 13:40
Modified
2018-03-14 13:44
Severity ?
Summary
Qt for Android environment variables alteration
Details
Qt for Android contains an information alteration vulnerability. Satoru Nagaoka of Cyber Defense Institute, Inc. reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
Impacted products
Show details on JVN DB website


{
  "@rdf:about": "https://jvndb.jvn.jp/en/contents/2017/JVNDB-2017-000247.html",
  "dc:date": "2018-03-14T13:44+09:00",
  "dcterms:issued": "2017-12-11T13:40+09:00",
  "dcterms:modified": "2018-03-14T13:44+09:00",
  "description": "Qt for Android contains an information alteration vulnerability.\r\n\r\nSatoru Nagaoka of Cyber Defense Institute, Inc. reported this vulnerability to IPA.\r\nJPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.",
  "link": "https://jvndb.jvn.jp/en/contents/2017/JVNDB-2017-000247.html",
  "sec:cpe": {
    "#text": "cpe:/a:qt:qt",
    "@product": "Qt",
    "@vendor": "The Qt Company",
    "@version": "2.2"
  },
  "sec:cvss": [
    {
      "@score": "5.1",
      "@severity": "Medium",
      "@type": "Base",
      "@vector": "AV:N/AC:H/Au:N/C:P/I:P/A:P",
      "@version": "2.0"
    },
    {
      "@score": "5.3",
      "@severity": "Medium",
      "@type": "Base",
      "@vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
      "@version": "3.0"
    }
  ],
  "sec:identifier": "JVNDB-2017-000247",
  "sec:references": [
    {
      "#text": "https://jvn.jp/en/jp/JVN27342829/index.html",
      "@id": "JVN#27342829",
      "@source": "JVN"
    },
    {
      "#text": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10905",
      "@id": "CVE-2017-10905",
      "@source": "CVE"
    },
    {
      "#text": "https://nvd.nist.gov/vuln/detail/CVE-2017-10905",
      "@id": "CVE-2017-10905",
      "@source": "NVD"
    },
    {
      "#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html",
      "@id": "CWE-Other",
      "@title": "No Mapping(CWE-Other)"
    }
  ],
  "title": "Qt for Android environment variables alteration"
}

jvndb-2017-000246
Vulnerability from jvndb
Published
2017-12-11 13:40
Modified
2018-03-14 13:48
Severity ?
Summary
Qt for Android vulnerable to OS command injection
Details
Qt for Android provided by The Qt Company contains an OS command injection vulnerability (CWE-78). Satoru Nagaoka of Cyber Defense Institute, Inc. reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
Impacted products
Show details on JVN DB website


{
  "@rdf:about": "https://jvndb.jvn.jp/en/contents/2017/JVNDB-2017-000246.html",
  "dc:date": "2018-03-14T13:48+09:00",
  "dcterms:issued": "2017-12-11T13:40+09:00",
  "dcterms:modified": "2018-03-14T13:48+09:00",
  "description": "Qt for Android provided by The Qt Company contains an OS command injection vulnerability (CWE-78).\r\n\r\nSatoru Nagaoka of Cyber Defense Institute, Inc. reported this vulnerability to IPA.\r\nJPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.",
  "link": "https://jvndb.jvn.jp/en/contents/2017/JVNDB-2017-000246.html",
  "sec:cpe": {
    "#text": "cpe:/a:qt:qt",
    "@product": "Qt",
    "@vendor": "The Qt Company",
    "@version": "2.2"
  },
  "sec:cvss": [
    {
      "@score": "5.1",
      "@severity": "Medium",
      "@type": "Base",
      "@vector": "AV:N/AC:H/Au:N/C:P/I:P/A:P",
      "@version": "2.0"
    },
    {
      "@score": "7.5",
      "@severity": "High",
      "@type": "Base",
      "@vector": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
      "@version": "3.0"
    }
  ],
  "sec:identifier": "JVNDB-2017-000246",
  "sec:references": [
    {
      "#text": "https://jvn.jp/en/jp/JVN67389262/index.html",
      "@id": "JVN#67389262",
      "@source": "JVN"
    },
    {
      "#text": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10904",
      "@id": "CVE-2017-10904",
      "@source": "CVE"
    },
    {
      "#text": "https://nvd.nist.gov/vuln/detail/CVE-2017-10904",
      "@id": "CVE-2017-10904",
      "@source": "NVD"
    },
    {
      "#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html",
      "@id": "CWE-78",
      "@title": "OS Command Injection(CWE-78)"
    }
  ],
  "title": "Qt for Android vulnerable to OS command injection"
}