CVE-2020-36123

Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.
CVSS

No CVSS.

References

No reference.

Configurations

No configuration.

History

02 May 2024, 22:15

Type Values Removed Values Added
CWE CWE-415
Summary
  • (es) Se ha detectado que libsixel versión v1.8.6, contiene una doble liberación por medio del componente sixel_chunk_destroy en el archivo /root/libsixel/src/chunk.c
Summary (en) saitoha libsixel v1.8.6 was discovered to contain a double free via the component sixel_chunk_destroy at /root/libsixel/src/chunk.c. (en) Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.
CVSS v2 : 6.8
v3 : 8.8
v2 : unknown
v3 : unknown
CPE cpe:2.3:a:libsixel_project:libsixel:1.8.6:*:*:*:*:*:*:*
References
  • {'url': 'https://github.com/saitoha/libsixel/issues/144', 'tags': ['Exploit', 'Issue Tracking', 'Third Party Advisory'], 'source': 'cve@mitre.org'}

Information

Published : 2022-03-10 17:41

Updated : 2024-05-02 22:15


NVD link : CVE-2020-36123

Mitre link : CVE-2020-36123

CVE.ORG link : CVE-2020-36123


JSON object : View

Products Affected

No product.

CWE

No CWE.