No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Wed, 01 Apr 2026 23:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Opensc Project
Opensc Project opensc |
|
| CPEs | cpe:2.3:a:opensc_project:opensc:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Opensc Project
Opensc Project opensc |
Tue, 31 Mar 2026 03:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
| |
| Metrics |
threat_severity
|
ssvc
|
Mon, 30 Mar 2026 17:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | OpenSC is an open source smart card tools and middleware. Prior to version 0.27.0, feeding a crafted input to the fuzz_pkcs15_reader harness causes OpenSC to perform an out-of-bounds heap read in the X.509/SPKI handling path. Specifically, sc_pkcs15_pubkey_from_spki_fields() allocates a zero-length buffer and then reads one byte past the end of that allocation. This issue has been patched in version 0.27.0. | |
| Title | OpenSC: Out of Bounds vulnerability | |
| Weaknesses | CWE-125 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-03-30T20:14:39.203Z
Reserved: 2025-11-21T01:08:02.615Z
Link: CVE-2025-66037
Updated: 2026-03-30T20:14:32.391Z
Status : Analyzed
Published: 2026-03-30T18:16:18.007
Modified: 2026-04-01T17:59:35.773
Link: CVE-2025-66037
OpenCVE Enrichment
Updated: 2026-03-30T20:55:26Z