Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Sun, 23 Nov 2025 19:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A security vulnerability has been detected in jarun nnn up to 5.1. The impacted element is the function show_content_in_floating_window/run_cmd_as_plugin of the file nnn/src/nnn.c. The manipulation leads to double free. An attack has to be approached locally. The identifier of the patch is 2f07ccdf21e705377862e5f9dfa31e1694979ac7. It is suggested to install a patch to address this issue. | |
| Title | jarun nnn nnn.c run_cmd_as_plugin double free | |
| Weaknesses | CWE-119 CWE-415 |
|
| References |
| |
| Metrics |
cvssV2_0
|
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2025-11-23T19:32:07.206Z
Reserved: 2025-11-22T17:37:52.818Z
Link: CVE-2025-13566
No data.
Status : Received
Published: 2025-11-23T20:15:39.960
Modified: 2025-11-23T20:15:39.960
Link: CVE-2025-13566
No data.
OpenCVE Enrichment
No data.