Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2025-10994— Open Babel gamessformat.cpp ReadMolecule use after free

CVSS 5.3 · Medium EPSS 0.03% · P10
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2025-10994

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Open Babel gamessformat.cpp ReadMolecule use after free
Source: NVD (National Vulnerability Database)
Vulnerability Description
A weakness has been identified in Open Babel up to 3.1.1. This affects the function GAMESSOutputFormat::ReadMolecule of the file gamessformat.cpp. This manipulation causes use after free. It is possible to launch the attack on the local host. The exploit has been made available to the public and could be exploited.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
Source: NVD (National Vulnerability Database)
Vulnerability Type
释放后使用
Source: NVD (National Vulnerability Database)
Vulnerability Title
openbabel 资源管理错误漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
openbabel是Open Babel开源的一个化学工具箱软件。 openbabel 3.1.1及之前版本存在资源管理错误漏洞,该漏洞源于文件gamessformat.cpp中GAMESSOutputFormat::ReadMolecule函数存在释放后重用问题,可能导致本地攻击。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
-Open Babel 3.1.0 -

II. Public POCs for CVE-2025-10994

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2025-10994

登录查看更多情报信息。

Same Patch Batch · n/a · 2025-09-26 · 25 CVEs total

CVE-2025-110315.3 MEDIUMDataTables examples.php path traversal
CVE-2025-110125.3 MEDIUMBehaviorTree Diagnostic Message script_parser.cpp ParseScript stack-based overflow
CVE-2025-109955.3 MEDIUMOpen Babel zipstreamimpl.h underflow memory corruption
CVE-2025-109965.3 MEDIUMOpen Babel smilesformat.cpp ParseSmiles heap-based overflow
CVE-2025-109975.3 MEDIUMOpen Babel chemkinformat.cpp CheckSpecies heap-based overflow
CVE-2025-109934.7 MEDIUMMuYuCMS Template Management admin.php code injection
CVE-2025-109814.3 MEDIUMJeecgBoot exportXls improper authorization
CVE-2025-110133.3 LOWBehaviorTree XML Parser xml_parsing.cpp loadDocImpl null pointer dereference
CVE-2025-109983.3 LOWOpen Babel chemkinformat.cpp ReadReactionQualifierLines null pointer dereference
CVE-2025-109993.3 LOWOpen Babel cacaoformat.cpp SetHilderbrandt null pointer dereference
CVE-2025-110003.3 LOWOpen Babel PQSformat.cpp ReadMolecule null pointer dereference
CVE-2025-110113.3 LOWBehaviorTree json_export.cpp fromJson null pointer dereference
CVE-2025-57692Piranha CMS 安全漏洞
CVE-2025-56383Notepad++ 安全漏洞
CVE-2025-58384Doxense Watchdoc 安全漏洞
CVE-2025-45994Aranda PassRecovery 安全漏洞
CVE-2025-55847Wavlink M86X3A_V240730 安全漏洞
CVE-2025-55848D-Link DIR-823X 安全漏洞
CVE-2025-26258Sourcecodester Employee Management System 安全漏洞
CVE-2025-59362Squid 安全漏洞

Showing top 20 of 25 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2025-10994

No comments yet


Leave a comment