Metrics
Affected Vendors & Products
Mon, 23 Sep 2024 19:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Opensc Project
Opensc Project opensc |
|
CPEs | cpe:2.3:a:opensc_project:opensc:*:*:*:*:*:*:*:* | |
Vendors & Products |
Opensc Project
Opensc Project opensc |
Wed, 18 Sep 2024 09:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
cvssV3_1
|
cvssV3_1
|
Thu, 12 Sep 2024 20:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
CPEs | cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:* |
Wed, 04 Sep 2024 14:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Tue, 03 Sep 2024 21:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | No description is available for this CVE. | A vulnerability was found in OpenSC, OpenSC tools, PKCS#11 module, minidriver, and CTK. An attacker could use a crafted USB Device or Smart Card, which would present the system with a specially crafted response to APDUs. When buffers are partially filled with data, initialized parts of the buffer can be incorrectly accessed. |
Title | libopensc: Incorrect handling length of buffers or files in libopensc | Libopensc: incorrect handling length of buffers or files in libopensc |
First Time appeared |
Redhat
Redhat enterprise Linux |
|
CPEs | cpe:/o:redhat:enterprise_linux:7 cpe:/o:redhat:enterprise_linux:8 cpe:/o:redhat:enterprise_linux:9 |
|
Vendors & Products |
Redhat
Redhat enterprise Linux |
|
References |
|
Mon, 02 Sep 2024 21:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | No description is available for this CVE. | |
Title | libopensc: Incorrect handling length of buffers or files in libopensc | |
Weaknesses | CWE-120 | |
References |
| |
Metrics |
threat_severity
|
cvssV3_1
|
Status: PUBLISHED
Assigner: redhat
Published: 2024-09-03T21:21:39.080Z
Updated: 2024-09-23T23:42:43.999Z
Reserved: 2024-09-02T18:28:35.896Z
Link: CVE-2024-45619
Updated: 2024-09-04T13:34:01.954Z
Status : Analyzed
Published: 2024-09-03T22:15:05.527
Modified: 2024-09-23T23:26:14.460
Link: CVE-2024-45619