Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Fri, 09 Jan 2026 20:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Unrtf Project
Unrtf Project unrtf |
|
| CPEs | cpe:2.3:a:unrtf_project:unrtf:0.21.10:*:*:*:*:*:*:* | |
| Vendors & Products |
Unrtf Project
Unrtf Project unrtf |
Mon, 05 Jan 2026 12:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Gnu
Gnu unrtf |
|
| Vendors & Products |
Gnu
Gnu unrtf |
Fri, 02 Jan 2026 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-476 | |
| Metrics |
cvssV3_1
|
Tue, 30 Dec 2025 18:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A NULL pointer dereference in the src/path.c component of GNU Unrtf v0.21.10 allows attackers to cause a Denial of Service (DoS) via injecting a crafted payload into the search_path parameter. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2026-01-02T18:09:28.347Z
Reserved: 2025-11-18T00:00:00.000Z
Link: CVE-2025-65411
Updated: 2026-01-02T16:29:48.244Z
Status : Analyzed
Published: 2025-12-30T18:15:47.280
Modified: 2026-01-09T19:47:55.587
Link: CVE-2025-65411
No data.
OpenCVE Enrichment
Updated: 2026-01-05T12:25:21Z