Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-31197 | A flaw has been found in Open Babel up to 3.1.1. Impacted is the function ChemKinFormat::CheckSpecies of the file /src/formats/chemkinformat.cpp. Executing manipulation can lead to heap-based buffer overflow. The attack can only be executed locally. The exploit has been published and may be used. |
Mon, 29 Sep 2025 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:openbabel:open_babel:*:*:*:*:*:*:*:* |
Fri, 26 Sep 2025 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 26 Sep 2025 11:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Openbabel
Openbabel open Babel |
|
| Vendors & Products |
Openbabel
Openbabel open Babel |
Fri, 26 Sep 2025 02:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A flaw has been found in Open Babel up to 3.1.1. Impacted is the function ChemKinFormat::CheckSpecies of the file /src/formats/chemkinformat.cpp. Executing manipulation can lead to heap-based buffer overflow. The attack can only be executed locally. The exploit has been published and may be used. | |
| Title | Open Babel chemkinformat.cpp CheckSpecies heap-based overflow | |
| Weaknesses | CWE-119 CWE-122 |
|
| References |
| |
| Metrics |
cvssV2_0
|
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2025-09-26T19:28:43.143Z
Reserved: 2025-09-25T18:05:00.688Z
Link: CVE-2025-10997
Updated: 2025-09-26T19:28:30.633Z
Status : Analyzed
Published: 2025-09-26T03:15:43.517
Modified: 2026-04-29T01:00:01.613
Link: CVE-2025-10997
No data.
OpenCVE Enrichment
Updated: 2025-09-26T11:35:25Z
EUVD