Lily Vulnerabilities

Security vulnerability tracking for Lily-lang Lily

Last updated: Mar 1, 2026
Total CVEs

3

Critical

0

With Exploits

3

Last 30 Days

0

Vulnerability Timeline

3 vulnerabilities discovered over time for Lily

Severity Distribution

Critical0
0%
High0
0%
Medium3
100%
Low0
0%
DescriptionVendor / ProductExploit Status
CVE-2026-33924.8

This vulnerability allows an attacker to crash the application by causing it to try to access a part of memory that doesn't exist, leading to a program failure. However, the attacker must have local access to the system to exploit this weakness.

lily-langlily
Exploit Available
about 1 month agoMar 1, 2026
CVE-2026-33914.8

An attacker with local access to the system can exploit a flaw in the lily software to read data outside the intended memory boundaries, potentially exposing sensitive information. This vulnerability requires the attacker to have physical or remote access to the machine where the software is running.

lily-langlily
Exploit Available
about 1 month agoMar 1, 2026
CVE-2026-33904.8

This vulnerability allows an attacker to read sensitive data from memory by exploiting a flaw in the error reporting function of the lily software. However, the attack can only be carried out on a local machine, meaning the attacker must have access to the system where lily is running.

lily-langlily
Exploit Available
about 1 month agoMar 1, 2026

About Lily-lang Lily Security

This page provides comprehensive security vulnerability tracking for Lily-lang Lily. Our database includes all CVEs affecting this product, updated in real-time from official sources.

Each vulnerability listing includes detailed CVSS severity analysis, exploit availability status, AI-generated explanations, and direct links to official security patches and vendor advisories.

Security Recommendations

  • • Always keep Lily updated to the latest version
  • • Subscribe to security advisories from Lily-lang
  • • Monitor this page for new vulnerabilities affecting your version
  • • Prioritize patching critical and high severity issues immediately