CVE-2026-3392
Plain English Summary
AI-powered analysis for quick understanding
This vulnerability allows an attacker to crash the application by causing it to try to access a part of memory that doesn't exist, leading to a program failure. However, the attacker must have local access to the system to exploit this weakness.
Technical Description
A weakness has been identified in FascinatedBox lily up to 2.3. The affected element is the function eval_tree of the file src/lily_emitter.c. This manipulation causes null pointer dereference. The attack is restricted to local execution. The exploit has been made available to the public and could be used for attacks. The project was informed of the problem early through an issue report but has not responded yet.
CVSS Vector Analysis
Vector String
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:XExploit Resources
Search for proof-of-concept code and exploit modules
Official References
Quick Information
Published
Mar 1, 2026
about 1 month ago
Last Modified
Mar 4, 2026
about 1 month ago
Vendor
lily-lang
Product
lily
Related Vulnerabilities
An attacker with local access to the system can exploit a flaw in the lily software to read data outside the intended memory boundaries, potentially exposing sensitive information. This vulnerability requires the attacker to have physical or remote access to the machine where the software is running.
This vulnerability allows an attacker to read sensitive data from memory by exploiting a flaw in the error reporting function of the lily software. However, the attack can only be carried out on a local machine, meaning the attacker must have access to the system where lily is running.