Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Fri, 06 Mar 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 05 Mar 2026 22:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-787 | |
| CPEs | cpe:2.3:a:chaiscript:chaiscript:*:*:*:*:*:*:*:* |
Mon, 02 Mar 2026 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Chaiscript
Chaiscript chaiscript |
|
| Vendors & Products |
Chaiscript
Chaiscript chaiscript |
Sun, 01 Mar 2026 05:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A security flaw has been discovered in ChaiScript up to 6.1.0. The impacted element is the function chaiscript::Boxed_Number::get_as of the file include/chaiscript/dispatchkit/boxed_number.hpp. Performing a manipulation results in memory corruption. The attack requires a local approach. The exploit has been released to the public and may be used for attacks. The project was informed of the problem early through an issue report but has not responded yet. | |
| Title | ChaiScript boxed_number.hpp get_as memory corruption | |
| Weaknesses | CWE-119 | |
| References |
| |
| Metrics |
cvssV2_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2026-03-06T14:52:28.017Z
Reserved: 2026-02-28T14:23:15.512Z
Link: CVE-2026-3382
Updated: 2026-03-06T14:52:23.388Z
Status : Analyzed
Published: 2026-03-01T06:15:58.750
Modified: 2026-03-05T22:29:48.560
Link: CVE-2026-3382
No data.
OpenCVE Enrichment
Updated: 2026-03-02T12:04:11Z