Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Wed, 11 Mar 2026 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 10 Mar 2026 20:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:xlnt-community:xlnt:*:*:*:*:*:*:*:* |
Mon, 09 Mar 2026 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Xlnt-community
Xlnt-community xlnt |
|
| Vendors & Products |
Xlnt-community
Xlnt-community xlnt |
Sat, 07 Mar 2026 15:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability was identified in xlnt-community xlnt up to 1.6.1. The affected element is the function xlnt::detail::xlsx_consumer::read_office_document of the file source/detail/serialization/xlsx_consumer.cpp of the component XLSX File Parser. The manipulation leads to null pointer dereference. The attack must be carried out locally. The exploit is publicly available and might be used. | |
| Title | xlnt-community xlnt XLSX File xlsx_consumer.cpp read_office_document null pointer dereference | |
| Weaknesses | CWE-404 CWE-476 |
|
| References |
| |
| Metrics |
cvssV2_0
|
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2026-03-11T16:29:12.576Z
Reserved: 2026-03-06T20:34:47.839Z
Link: CVE-2026-3665
Updated: 2026-03-11T16:14:30.465Z
Status : Analyzed
Published: 2026-03-07T16:15:56.583
Modified: 2026-04-29T01:00:01.613
Link: CVE-2026-3665
No data.
OpenCVE Enrichment
Updated: 2026-04-17T12:15:18Z