Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Fri, 20 Feb 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-787 | |
| CPEs | cpe:2.3:a:hdfgroup:hdf5:*:*:*:*:*:*:*:* |
Fri, 20 Feb 2026 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-131 | |
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Fri, 20 Feb 2026 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Hdfgroup
Hdfgroup hdf5 |
|
| Vendors & Products |
Hdfgroup
Hdfgroup hdf5 |
Fri, 20 Feb 2026 01:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 19 Feb 2026 20:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | HDF5 is software for managing data. Prior to version 1.14.4-2, an attacker who can control an `h5` file parsed by HDF5 can trigger a write-based heap buffer overflow condition. This can lead to a denial-of-service condition, and potentially further issues such as remote code execution depending on the practical exploitability of the heap overflow against modern operating systems. Real-world exploitability of this issue in terms of remote-code execution is currently unknown. Version 1.14.4-2 fixes the issue. | |
| Title | HDF5 Affected by H5T__conv_struct_opt Heap Buffer Overflow | |
| Weaknesses | CWE-122 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-02-19T21:23:04.319Z
Reserved: 2026-02-11T19:56:24.813Z
Link: CVE-2026-26200
Updated: 2026-02-19T21:16:39.592Z
Status : Analyzed
Published: 2026-02-19T20:25:42.610
Modified: 2026-02-20T20:14:37.683
Link: CVE-2026-26200
OpenCVE Enrichment
Updated: 2026-04-18T11:45:44Z