{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-2661","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2026-02-18T07:31:01.293Z","datePublished":"2026-02-18T19:02:06.580Z","dateUpdated":"2026-02-23T10:18:59.149Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2026-02-23T10:18:59.149Z"},"title":"Squirrel sqobject.h operator heap-based overflow","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-122","lang":"en","description":"Heap-based Buffer Overflow"}]},{"descriptions":[{"type":"CWE","cweId":"CWE-119","lang":"en","description":"Memory Corruption"}]}],"affected":[{"vendor":"n/a","product":"Squirrel","versions":[{"version":"3.0","status":"affected"},{"version":"3.1","status":"affected"},{"version":"3.2","status":"affected"}]}],"descriptions":[{"lang":"en","value":"A security flaw has been discovered in Squirrel up to 3.2. This affects the function SQObjectPtr::operator in the library squirrel/sqobject.h. The manipulation results in heap-based buffer overflow. The attack needs to be approached locally. The exploit has been released to the public and may be used for attacks. The project was informed of the problem early through an issue report but has not responded yet."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":4.8,"vectorString":"CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P","baseSeverity":"MEDIUM"}},{"cvssV3_1":{"version":"3.1","baseScore":3.3,"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:X/RC:R","baseSeverity":"LOW"}},{"cvssV3_0":{"version":"3.0","baseScore":3.3,"vectorString":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:X/RC:R","baseSeverity":"LOW"}},{"cvssV2_0":{"version":"2.0","baseScore":1.7,"vectorString":"AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:ND/RC:UR"}}],"timeline":[{"time":"2026-02-18T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2026-02-18T01:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2026-02-21T19:31:06.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"Oneafter (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.346459","name":"VDB-346459 | Squirrel sqobject.h operator heap-based overflow","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.346459","name":"VDB-346459 | CTI Indicators (IOB, IOC, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.753165","name":"Submit #753165 | albertodemichelis  squirrel master-branch Heap-based Buffer Overflow","tags":["third-party-advisory"]},{"url":"https://github.com/albertodemichelis/squirrel/issues/310","tags":["issue-tracking"]},{"url":"https://github.com/oneafter/0122/blob/main/i310/repro","tags":["exploit"]}]},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-02-18T19:50:31.911242Z","id":"CVE-2026-2661","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-02-18T19:54:14.409Z"}}]}}