A security flaw has been discovered in ChaiScript up to 6.1.0. The impacted element is the function chaiscript::Boxed_Number::get_as of the file include/chaiscript/dispatchkit/boxed_number.hpp. Performing a manipulation results in memory corruption. The attack requires a local approach. The exploit has been released to the public and may be used for attacks. The project was informed of the problem early through an issue report but has not responded yet.
Metrics
Affected Vendors & Products
References
History
Sun, 01 Mar 2026 05:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A security flaw has been discovered in ChaiScript up to 6.1.0. The impacted element is the function chaiscript::Boxed_Number::get_as of the file include/chaiscript/dispatchkit/boxed_number.hpp. Performing a manipulation results in memory corruption. The attack requires a local approach. The exploit has been released to the public and may be used for attacks. The project was informed of the problem early through an issue report but has not responded yet. | |
| Title | ChaiScript boxed_number.hpp get_as memory corruption | |
| Weaknesses | CWE-119 | |
| References |
| |
| Metrics |
cvssV2_0
|
Status: PUBLISHED
Assigner: VulDB
Published: 2026-03-01T05:32:12.992Z
Updated: 2026-03-01T05:32:12.992Z
Reserved: 2026-02-28T14:23:15.512Z
Link: CVE-2026-3382
No data.
Status : Received
Published: 2026-03-01T06:15:58.750
Modified: 2026-03-01T06:15:58.750
Link: CVE-2026-3382
No data.
ReportizFlow