Metrics
Affected Vendors & Products
Mon, 29 Sep 2025 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:openbabel:open_babel:*:*:*:*:*:*:*:* |
Fri, 26 Sep 2025 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 26 Sep 2025 11:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Openbabel
Openbabel open Babel |
|
| Vendors & Products |
Openbabel
Openbabel open Babel |
Fri, 26 Sep 2025 02:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A weakness has been identified in Open Babel up to 3.1.1. This affects the function GAMESSOutputFormat::ReadMolecule of the file gamessformat.cpp. This manipulation causes use after free. It is possible to launch the attack on the local host. The exploit has been made available to the public and could be exploited. | |
| Title | Open Babel gamessformat.cpp ReadMolecule use after free | |
| Weaknesses | CWE-119 CWE-416 |
|
| References |
| |
| Metrics |
cvssV2_0
|
Status: PUBLISHED
Assigner: VulDB
Published: 2025-09-26T02:02:07.422Z
Updated: 2025-09-26T19:26:09.605Z
Reserved: 2025-09-25T18:04:46.647Z
Link: CVE-2025-10994
Updated: 2025-09-26T19:26:00.435Z
Status : Analyzed
Published: 2025-09-26T02:15:52.100
Modified: 2025-09-29T13:07:41.623
Link: CVE-2025-10994
No data.