Subscriptions
Tracking
Sign in to view the affected projects.
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Tue, 06 Jan 2026 17:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Unrtf Project
Unrtf Project unrtf |
|
| CPEs | cpe:2.3:a:unrtf_project:unrtf:0.21.10:*:*:*:*:*:*:* | |
| Vendors & Products |
Unrtf Project
Unrtf Project unrtf |
Mon, 05 Jan 2026 12:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Gnu
Gnu unrtf |
|
| Vendors & Products |
Gnu
Gnu unrtf |
Tue, 30 Dec 2025 18:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Tue, 23 Dec 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-121 | |
| Metrics |
cvssV3_1
|
Tue, 23 Dec 2025 17:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A stack overflow in the src/main.c component of GNU Unrtf v0.21.10 allows attackers to cause a Denial of Service (DoS) via injecting a crafted input into the filename parameter. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-12-30T17:42:46.577Z
Reserved: 2025-11-18T00:00:00.000Z
Link: CVE-2025-65410
Updated: 2025-12-23T18:56:29.227Z
Status : Analyzed
Published: 2025-12-23T17:15:48.333
Modified: 2026-01-06T17:31:26.200
Link: CVE-2025-65410
No data.
OpenCVE Enrichment
Updated: 2026-01-05T12:25:49Z