Lucene search

K

CVE-2024-45619 Libopensc: incorrect handling length of buffers or files in libopensc

🗓️ 03 Sep 2024 21:39:21Reported by redhatType 
cvelist
 cvelist
🔗 www.cve.org👁 5 Views

Vulnerability in Libopensc: incorrect buffer handlin

Show more
Related
Affected
Refs
ReporterTitlePublishedViews
Family
NVD
CVE-2024-45619
3 Sep 202422:15
nvd
AlpineLinux
CVE-2024-45619
3 Sep 202422:15
alpinelinux
OSV
CVE-2024-45619
3 Sep 202422:15
osv
OSV
UBUNTU-CVE-2024-45619
3 Sep 202422:15
osv
OSV
Security update for opensc
25 Sep 202416:11
osv
OSV
Security update for opensc
25 Sep 202416:11
osv
OSV
opensc-0.25.1-2.1 on GA media
2 Oct 202400:00
osv
OSV
Security update for opensc
3 Oct 202412:03
osv
OSV
Security update for opensc
25 Sep 202416:11
osv
CVE
CVE-2024-45619
3 Sep 202422:15
cve
Rows per page
[
  {
    "vendor": "Red Hat",
    "product": "Red Hat Enterprise Linux 7",
    "collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
    "packageName": "opensc",
    "defaultStatus": "affected",
    "cpes": [
      "cpe:/o:redhat:enterprise_linux:7"
    ]
  },
  {
    "vendor": "Red Hat",
    "product": "Red Hat Enterprise Linux 8",
    "collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
    "packageName": "opensc",
    "defaultStatus": "affected",
    "cpes": [
      "cpe:/o:redhat:enterprise_linux:8"
    ]
  },
  {
    "vendor": "Red Hat",
    "product": "Red Hat Enterprise Linux 9",
    "collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
    "packageName": "opensc",
    "defaultStatus": "affected",
    "cpes": [
      "cpe:/o:redhat:enterprise_linux:9"
    ]
  }
]

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo
03 Sep 2024 21:21Current
CVSS34.3
EPSS0.000
5
.json
Report