Metrics
Affected Vendors & Products
Mon, 29 Sep 2025 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:openbabel:open_babel:*:*:*:*:*:*:*:* |
Fri, 26 Sep 2025 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 26 Sep 2025 11:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Openbabel
Openbabel open Babel |
|
| Vendors & Products |
Openbabel
Openbabel open Babel |
Fri, 26 Sep 2025 02:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A flaw has been found in Open Babel up to 3.1.1. Impacted is the function ChemKinFormat::CheckSpecies of the file /src/formats/chemkinformat.cpp. Executing manipulation can lead to heap-based buffer overflow. The attack can only be executed locally. The exploit has been published and may be used. | |
| Title | Open Babel chemkinformat.cpp CheckSpecies heap-based overflow | |
| Weaknesses | CWE-119 CWE-122 |
|
| References |
| |
| Metrics |
cvssV2_0
|
Status: PUBLISHED
Assigner: VulDB
Published: 2025-09-26T02:32:09.748Z
Updated: 2025-09-26T19:28:43.143Z
Reserved: 2025-09-25T18:05:00.688Z
Link: CVE-2025-10997
Updated: 2025-09-26T19:28:30.633Z
Status : Analyzed
Published: 2025-09-26T03:15:43.517
Modified: 2025-09-29T13:08:33.063
Link: CVE-2025-10997
No data.