Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Mon, 24 Nov 2025 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 24 Nov 2025 09:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Jarun
Jarun nnn |
|
| Vendors & Products |
Jarun
Jarun nnn |
Sun, 23 Nov 2025 19:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A security vulnerability has been detected in jarun nnn up to 5.1. The impacted element is the function show_content_in_floating_window/run_cmd_as_plugin of the file nnn/src/nnn.c. The manipulation leads to double free. An attack has to be approached locally. The identifier of the patch is 2f07ccdf21e705377862e5f9dfa31e1694979ac7. It is suggested to install a patch to address this issue. | |
| Title | jarun nnn nnn.c run_cmd_as_plugin double free | |
| Weaknesses | CWE-119 CWE-415 |
|
| References |
| |
| Metrics |
cvssV2_0
|
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2025-11-24T21:20:43.386Z
Reserved: 2025-11-22T17:37:52.818Z
Link: CVE-2025-13566
Updated: 2025-11-24T21:20:38.875Z
Status : Deferred
Published: 2025-11-23T20:15:39.960
Modified: 2026-04-15T00:35:42.020
Link: CVE-2025-13566
No data.
OpenCVE Enrichment
Updated: 2025-11-24T09:07:41Z