Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Sat, 10 Jan 2026 05:00:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Unrtf Project
Unrtf Project unrtf |
|
| CPEs | cpe:2.3:a:unrtf_project:unrtf:0.21.10:*:*:*:*:*:*:* | |
| Vendors & Products |
Unrtf Project
Unrtf Project unrtf |
Mon, 05 Jan 2026 21:30:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Gnu
Gnu unrtf |
|
| Vendors & Products |
Gnu
Gnu unrtf |
Sat, 03 Jan 2026 03:15:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-476 | |
| Metrics |
cvssV3_1
|
Wed, 31 Dec 2025 03:00:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A NULL pointer dereference in the src/path.c component of GNU Unrtf v0.21.10 allows attackers to cause a Denial of Service (DoS) via injecting a crafted payload into the search_path parameter. | |
| References |
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2026-01-02T18:09:28.347Z
Reserved: 2025-11-18T00:00:00.000Z
Link: CVE-2025-65411
Updated: 2026-01-02T16:29:48.244Z
Status : Analyzed
Published: 2025-12-30T18:15:47.280
Modified: 2026-01-09T19:47:55.587
Link: CVE-2025-65411
No data.
OpenCVE Enrichment
Updated: 2026-01-05T21:25:21Z