Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Tue, 10 Mar 2026 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:xlnt-community:xlnt:*:*:*:*:*:*:*:* |
Wed, 04 Mar 2026 15:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Xlnt-community
Xlnt-community xlnt |
|
| Vendors & Products |
Xlnt-community
Xlnt-community xlnt |
Tue, 03 Mar 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 03 Mar 2026 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A weakness has been identified in xlnt-community xlnt up to 1.6.1. Impacted is the function xlnt::detail::binary_writer::append of the file source/detail/binary.hpp of the component Compound Document Parser. This manipulation causes heap-based buffer overflow. The attack can only be executed locally. The exploit has been made available to the public and could be used for attacks. Patch name: 147. It is suggested to install a patch to address this issue. | |
| Title | xlnt-community xlnt Compound Document binary.hpp append heap-based overflow | |
| Weaknesses | CWE-119 CWE-122 |
|
| References |
|
|
| Metrics |
cvssV2_0
|
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2026-03-03T14:48:28.075Z
Reserved: 2026-03-03T06:03:44.804Z
Link: CVE-2026-3463
Updated: 2026-03-03T14:48:08.016Z
Status : Analyzed
Published: 2026-03-03T12:16:06.880
Modified: 2026-04-29T01:00:01.613
Link: CVE-2026-3463
No data.
OpenCVE Enrichment
Updated: 2026-04-18T10:15:25Z