CVE-2026-3391
Plain English Summary
AI-powered analysis for quick understanding
An attacker with local access to the system can exploit a flaw in the lily software to read data outside the intended memory boundaries, potentially exposing sensitive information. This vulnerability requires the attacker to have physical or remote access to the machine where the software is running.
Technical Description
A security flaw has been discovered in FascinatedBox lily up to 2.3. Impacted is the function clear_storages of the file src/lily_emitter.c. The manipulation results in out-of-bounds read. The attack is only possible with local access. The exploit has been released to the public and may be used for attacks. The project was informed of the problem early through an issue report but has not responded yet.
CVSS Vector Analysis
Vector String
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:XExploit Resources
Search for proof-of-concept code and exploit modules
Official References
Quick Information
Published
Mar 1, 2026
about 1 month ago
Last Modified
Mar 4, 2026
about 1 month ago
Vendor
lily-lang
Product
lily
Related Vulnerabilities
This vulnerability allows an attacker to crash the application by causing it to try to access a part of memory that doesn't exist, leading to a program failure. However, the attacker must have local access to the system to exploit this weakness.
This vulnerability allows an attacker to read sensitive data from memory by exploiting a flaw in the error reporting function of the lily software. However, the attack can only be carried out on a local machine, meaning the attacker must have access to the system where lily is running.