Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-3f56-w4g2-mx64

Опубликовано: 19 фев. 2026
Источник: github
Github: Не прошло ревью
CVSS4: 2.1
CVSS3: 4.3

Описание

A vulnerability was detected in Open Babel up to 3.1.1. The impacted element is the function OBAtom::SetFormalCharge in the library include/openbabel/atom.h of the component MOL2 File Handler. The manipulation results in out-of-bounds read. It is possible to launch the attack remotely. The exploit is now public and may be used. The project was informed of the problem early through an issue report but has not responded yet.

A vulnerability was detected in Open Babel up to 3.1.1. The impacted element is the function OBAtom::SetFormalCharge in the library include/openbabel/atom.h of the component MOL2 File Handler. The manipulation results in out-of-bounds read. It is possible to launch the attack remotely. The exploit is now public and may be used. The project was informed of the problem early through an issue report but has not responded yet.

EPSS

Процентиль: 18%
0.00059
Низкий

2.1 Low

CVSS4

4.3 Medium

CVSS3

Дефекты

CWE-119

Связанные уязвимости

CVSS3: 4.3
ubuntu
около 1 месяца назад

A vulnerability was detected in Open Babel up to 3.1.1. The impacted element is the function OBAtom::SetFormalCharge in the library include/openbabel/atom.h of the component MOL2 File Handler. The manipulation results in out-of-bounds read. It is possible to launch the attack remotely. The exploit is now public and may be used. The patch is identified as e23a224b8fd9d7c2a7cde9ef4ec6afb4c05aa08a. A patch should be applied to remediate this issue. The project was informed of the problem early through an issue report but has not responded yet.

CVSS3: 4.3
nvd
около 1 месяца назад

A vulnerability was detected in Open Babel up to 3.1.1. The impacted element is the function OBAtom::SetFormalCharge in the library include/openbabel/atom.h of the component MOL2 File Handler. The manipulation results in out-of-bounds read. It is possible to launch the attack remotely. The exploit is now public and may be used. The patch is identified as e23a224b8fd9d7c2a7cde9ef4ec6afb4c05aa08a. A patch should be applied to remediate this issue. The project was informed of the problem early through an issue report but has not responded yet.

CVSS3: 4.3
debian
около 1 месяца назад

A vulnerability was detected in Open Babel up to 3.1.1. The impacted e ...

EPSS

Процентиль: 18%
0.00059
Низкий

2.1 Low

CVSS4

4.3 Medium

CVSS3

Дефекты

CWE-119