Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Tue, 24 Mar 2026 10:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Directory Traversal Vulnerability in Doom Launcher 3.8.1.0 During Game File Extraction |
Tue, 17 Mar 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-22 | |
| Metrics |
cvssV3_1
|
Tue, 17 Mar 2026 10:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Nstlaurent
Nstlaurent doom Launcher |
|
| Vendors & Products |
Nstlaurent
Nstlaurent doom Launcher |
Mon, 16 Mar 2026 17:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Doom Launcher 3.8.1.0 is vulnerable to Directory Traversal due to missing file path validation during the extraction of game files | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2026-03-17T13:55:53.024Z
Reserved: 2025-12-08T00:00:00.000Z
Link: CVE-2025-66687
Updated: 2026-03-17T13:55:47.353Z
Status : Deferred
Published: 2026-03-16T18:16:04.657
Modified: 2026-04-27T19:18:46.690
Link: CVE-2025-66687
No data.
OpenCVE Enrichment
Updated: 2026-03-23T14:00:55Z