3
0
3
0
Vulnerability Timeline
3 vulnerabilities discovered over time for Lily
Severity Distribution
| Description | Vendor / Product | Exploit Status | |||
|---|---|---|---|---|---|
| CVE-2026-3392 | 4.8 | This vulnerability allows an attacker to crash the application by causing it to try to access a part of memory that doesn't exist, leading to a program failure. However, the attacker must have local access to the system to exploit this weakness. | lily-langlily | Exploit Available | about 1 month agoMar 1, 2026 |
| CVE-2026-3391 | 4.8 | An attacker with local access to the system can exploit a flaw in the lily software to read data outside the intended memory boundaries, potentially exposing sensitive information. This vulnerability requires the attacker to have physical or remote access to the machine where the software is running. | lily-langlily | Exploit Available | about 1 month agoMar 1, 2026 |
| CVE-2026-3390 | 4.8 | This vulnerability allows an attacker to read sensitive data from memory by exploiting a flaw in the error reporting function of the lily software. However, the attack can only be carried out on a local machine, meaning the attacker must have access to the system where lily is running. | lily-langlily | Exploit Available | about 1 month agoMar 1, 2026 |
About Lily-lang Lily Security
This page provides comprehensive security vulnerability tracking for Lily-lang Lily. Our database includes all CVEs affecting this product, updated in real-time from official sources.
Each vulnerability listing includes detailed CVSS severity analysis, exploit availability status, AI-generated explanations, and direct links to official security patches and vendor advisories.
Security Recommendations
- • Always keep Lily updated to the latest version
- • Subscribe to security advisories from Lily-lang
- • Monitor this page for new vulnerabilities affecting your version
- • Prioritize patching critical and high severity issues immediately