Metrics
Affected Vendors & Products
Mon, 29 Sep 2025 13:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| CPEs | cpe:2.3:a:openbabel:open_babel:*:*:*:*:*:*:*:* | 
Fri, 26 Sep 2025 20:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Metrics | ssvc 
 | 
Fri, 26 Sep 2025 11:45:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| First Time appeared | Openbabel Openbabel open Babel | |
| Vendors & Products | Openbabel Openbabel open Babel | 
Fri, 26 Sep 2025 02:45:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Description | A flaw has been found in Open Babel up to 3.1.1. Impacted is the function ChemKinFormat::CheckSpecies of the file /src/formats/chemkinformat.cpp. Executing manipulation can lead to heap-based buffer overflow. The attack can only be executed locally. The exploit has been published and may be used. | |
| Title | Open Babel chemkinformat.cpp CheckSpecies heap-based overflow | |
| Weaknesses | CWE-119 CWE-122 | |
| References |  | |
| Metrics | cvssV2_0 
 
 
 
 | 
 MITRE
                        MITRE
                    Status: PUBLISHED
Assigner: VulDB
Published: 2025-09-26T02:32:09.748Z
Updated: 2025-09-26T19:28:43.143Z
Reserved: 2025-09-25T18:05:00.688Z
Link: CVE-2025-10997
 Vulnrichment
                        Vulnrichment
                    Updated: 2025-09-26T19:28:30.633Z
 NVD
                        NVD
                    Status : Analyzed
Published: 2025-09-26T03:15:43.517
Modified: 2025-09-29T13:08:33.063
Link: CVE-2025-10997
 Redhat
                        Redhat
                    No data.