Lily-lang Vulnerabilities
Comprehensive security vulnerability database for Lily-lang products
3
0
3
0
Severity Distribution
| Description | Vendor / Product | Exploit Status | |||
|---|---|---|---|---|---|
| CVE-2026-3392 | 4.8 | This vulnerability allows an attacker to crash the application by causing it to try to access a part of memory that doesn't exist, leading to a program failure. However, the attacker must have local access to the system to exploit this weakness. | lily-langlily | Exploit Available | about 1 month agoMar 1, 2026 |
| CVE-2026-3391 | 4.8 | An attacker with local access to the system can exploit a flaw in the lily software to read data outside the intended memory boundaries, potentially exposing sensitive information. This vulnerability requires the attacker to have physical or remote access to the machine where the software is running. | lily-langlily | Exploit Available | about 1 month agoMar 1, 2026 |
| CVE-2026-3390 | 4.8 | This vulnerability allows an attacker to read sensitive data from memory by exploiting a flaw in the error reporting function of the lily software. However, the attack can only be carried out on a local machine, meaning the attacker must have access to the system where lily is running. | lily-langlily | Exploit Available | about 1 month agoMar 1, 2026 |
About Lily-lang Security
This page tracks all publicly disclosed security vulnerabilities (CVEs) affecting Lily-lang products. Our database is updated in real-time from the National Vulnerability Database (NVD) and enriched with exploit information from GitHub and other security research sources.
Each CVE listing includes CVSS severity scores, exploit availability status, AI-powered vulnerability summaries, and links to official patches and security advisories.