CVE-2025-10998
BaseFortify
Publication date: 2025-09-26
Last updated on: 2026-04-29
Assigner: VulDB
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| openbabel | open_babel | to 3.1.1 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-404 | The product does not release or incorrectly releases a resource before it is made available for re-use. |
| CWE-476 | The product dereferences a pointer that it expects to be valid but is NULL. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in Open Babel up to version 3.1.1, specifically in the function ChemKinFormat::ReadReactionQualifierLines within the file /src/formats/chemkinformat.cpp. It allows an attacker with local access to cause a null pointer dereference, which can lead to a denial of service or crash of the application.
How can this vulnerability impact me? :
The vulnerability can cause the Open Babel application to crash or become unavailable due to a null pointer dereference. Since the attack requires local access, it may impact users who have local privileges on the system by causing denial of service or instability in the affected software.