opensc vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the opensc package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • L
Heap-based Buffer Overflow

*
  • L
Buffer Overflow

*
  • L
Use of Uninitialized Variable

*
  • L
Use of Uninitialized Variable

*
  • L
Use of Uninitialized Variable

*
  • L
Buffer Overflow

*
  • L
Use of Uninitialized Variable

*
  • M
Information Exposure

<0:0.20.0-8.el8_9
  • M
Improper Authentication

<0:0.20.0-7.el8_9
  • M
Out-of-Bounds

<0:0.20.0-7.el8_9
  • L
Out-of-Bounds

<0:0.20.0-6.el8
  • L
Use After Free

*
  • L
Double Free

*
  • L
Out-of-Bounds

*
  • L
Unchecked Return Value

*
  • L
Out-of-Bounds

*
  • M
Stack-based Buffer Overflow

<0:0.20.0-4.el8
  • M
Stack-based Buffer Overflow

<0:0.20.0-4.el8
  • M
Stack-based Buffer Overflow

<0:0.20.0-4.el8
  • M
Stack-based Buffer Overflow

<0:0.20.0-4.el8
  • M
Stack-based Buffer Overflow

<0:0.20.0-4.el8
  • M
Stack-based Buffer Overflow

<0:0.20.0-4.el8
  • M
Stack-based Buffer Overflow

<0:0.20.0-4.el8
  • M
Stack-based Buffer Overflow

<0:0.20.0-4.el8
  • M
Stack-based Buffer Overflow

<0:0.20.0-4.el8
  • M
Stack-based Buffer Overflow

<0:0.20.0-4.el8
  • M
Stack-based Buffer Overflow

<0:0.20.0-4.el8
  • M
Stack-based Buffer Overflow

<0:0.20.0-4.el8
  • M
Stack-based Buffer Overflow

<0:0.20.0-4.el8
  • M
Stack-based Buffer Overflow

<0:0.20.0-4.el8
  • M
Stack-based Buffer Overflow

<0:0.20.0-4.el8
  • M
Stack-based Buffer Overflow

<0:0.20.0-4.el8
  • M
Stack-based Buffer Overflow

<0:0.20.0-4.el8
  • M
Stack-based Buffer Overflow

<0:0.20.0-4.el8
  • M
Stack-based Buffer Overflow

<0:0.20.0-4.el8
  • M
Stack-based Buffer Overflow

<0:0.20.0-4.el8
  • M
Stack-based Buffer Overflow

<0:0.20.0-4.el8
  • M
Stack-based Buffer Overflow

<0:0.20.0-4.el8
  • M
Stack-based Buffer Overflow

<0:0.20.0-4.el8
  • M
Stack-based Buffer Overflow

<0:0.20.0-4.el8
  • M
Stack-based Buffer Overflow

<0:0.20.0-4.el8
  • M
Stack-based Buffer Overflow

<0:0.20.0-4.el8
  • M
Heap-based Buffer Overflow

<0:0.20.0-4.el8
  • M
Heap-based Buffer Overflow

<0:0.20.0-4.el8
  • M
Heap-based Buffer Overflow

<0:0.20.0-4.el8
  • M
Heap-based Buffer Overflow

<0:0.20.0-4.el8
  • M
Heap-based Buffer Overflow

<0:0.20.0-4.el8
  • M
Heap-based Buffer Overflow

<0:0.20.0-4.el8
  • M
Heap-based Buffer Overflow

<0:0.20.0-4.el8
  • M
Heap-based Buffer Overflow

<0:0.20.0-4.el8
  • M
Heap-based Buffer Overflow

<0:0.20.0-4.el8
  • M
Heap-based Buffer Overflow

<0:0.20.0-4.el8
  • M
Heap-based Buffer Overflow

<0:0.20.0-4.el8
  • M
Heap-based Buffer Overflow

<0:0.20.0-4.el8
  • M
Heap-based Buffer Overflow

<0:0.20.0-4.el8
  • M
Use After Free

<0:0.20.0-2.el8
  • M
Use After Free

<0:0.20.0-2.el8
  • M
Use After Free

<0:0.20.0-2.el8
  • M
Use After Free

<0:0.20.0-2.el8
  • M
Use After Free

<0:0.20.0-2.el8
  • M
Use After Free

<0:0.20.0-2.el8
  • M
Use After Free

<0:0.20.0-2.el8
  • M
Use After Free

<0:0.20.0-2.el8
  • M
Use After Free

<0:0.20.0-2.el8
  • M
Use After Free

<0:0.20.0-2.el8
  • M
Use After Free

<0:0.20.0-2.el8
  • M
Use After Free

<0:0.20.0-2.el8
  • M
Use After Free

<0:0.20.0-2.el8
  • M
Out-of-bounds Read

<0:0.20.0-2.el8
  • M
Out-of-bounds Read

<0:0.20.0-2.el8
  • M
Out-of-bounds Read

<0:0.20.0-2.el8
  • M
Out-of-bounds Read

<0:0.20.0-2.el8
  • M
Out-of-bounds Read

<0:0.20.0-2.el8
  • M
Out-of-bounds Read

<0:0.20.0-2.el8
  • M
Out-of-bounds Read

<0:0.20.0-2.el8
  • M
Out-of-bounds Read

<0:0.20.0-2.el8
  • M
Out-of-bounds Read

<0:0.20.0-2.el8
  • M
Out-of-bounds Read

<0:0.20.0-2.el8
  • M
Out-of-bounds Read

<0:0.20.0-2.el8
  • M
Out-of-bounds Read

<0:0.20.0-2.el8
  • M
Out-of-bounds Read

<0:0.20.0-2.el8
  • M
Out-of-Bounds

<0:0.20.0-2.el8
  • M
Out-of-Bounds

<0:0.20.0-2.el8
  • M
Out-of-Bounds

<0:0.20.0-2.el8
  • M
Out-of-Bounds

<0:0.20.0-2.el8
  • M
Out-of-Bounds

<0:0.20.0-2.el8
  • M
Out-of-Bounds

<0:0.20.0-2.el8
  • M
Out-of-Bounds

<0:0.20.0-2.el8
  • M
Out-of-Bounds

<0:0.20.0-2.el8
  • M
Out-of-Bounds

<0:0.20.0-2.el8
  • M
Out-of-Bounds

<0:0.20.0-2.el8
  • M
Out-of-Bounds

<0:0.20.0-2.el8
  • M
Out-of-Bounds

<0:0.20.0-2.el8
  • M
Out-of-Bounds

<0:0.20.0-2.el8
  • M
Out-of-Bounds

<0:0.20.0-2.el8
  • M
Out-of-Bounds

<0:0.20.0-2.el8
  • M
Out-of-Bounds

<0:0.20.0-2.el8
  • M
Out-of-Bounds

<0:0.20.0-2.el8
  • M
Out-of-Bounds

<0:0.20.0-2.el8
  • M
Out-of-Bounds

<0:0.20.0-2.el8
  • M
Out-of-Bounds

<0:0.20.0-2.el8
  • M
Out-of-Bounds

<0:0.20.0-2.el8
  • M
Out-of-Bounds

<0:0.20.0-2.el8
  • M
Out-of-Bounds

<0:0.20.0-2.el8
  • M
Out-of-Bounds

<0:0.20.0-2.el8
  • M
Out-of-Bounds

<0:0.20.0-2.el8
  • M
Out-of-Bounds

<0:0.20.0-2.el8
  • M
Out-of-Bounds

<0:0.20.0-2.el8
  • M
Out-of-Bounds

<0:0.20.0-2.el8
  • M
Out-of-Bounds

<0:0.20.0-2.el8
  • M
Out-of-Bounds

<0:0.20.0-2.el8
  • M
Out-of-Bounds

<0:0.20.0-2.el8
  • M
Out-of-Bounds

<0:0.20.0-2.el8
  • M
Out-of-Bounds

<0:0.20.0-2.el8
  • M
Out-of-Bounds

<0:0.20.0-2.el8
  • M
Out-of-Bounds

<0:0.20.0-2.el8
  • M
Out-of-Bounds

<0:0.20.0-2.el8
  • M
Out-of-Bounds

<0:0.20.0-2.el8
  • M
Out-of-Bounds

<0:0.20.0-2.el8
  • M
Out-of-Bounds

<0:0.20.0-2.el8