{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-3382","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2026-02-28T14:23:15.512Z","datePublished":"2026-03-01T05:32:12.992Z","dateUpdated":"2026-03-06T14:52:28.017Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2026-03-01T05:32:12.992Z"},"title":"ChaiScript boxed_number.hpp get_as memory corruption","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-119","lang":"en","description":"Memory Corruption"}]}],"affected":[{"vendor":"n/a","product":"ChaiScript","versions":[{"version":"6.0","status":"affected"},{"version":"6.1.0","status":"affected"}]}],"descriptions":[{"lang":"en","value":"A security flaw has been discovered in ChaiScript up to 6.1.0. The impacted element is the function chaiscript::Boxed_Number::get_as of the file include/chaiscript/dispatchkit/boxed_number.hpp. Performing a manipulation results in memory corruption. The attack requires a local approach. The exploit has been released to the public and may be used for attacks. The project was informed of the problem early through an issue report but has not responded yet."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":4.8,"vectorString":"CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P","baseSeverity":"MEDIUM"}},{"cvssV3_1":{"version":"3.1","baseScore":3.3,"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:X/RC:R","baseSeverity":"LOW"}},{"cvssV3_0":{"version":"3.0","baseScore":3.3,"vectorString":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:X/RC:R","baseSeverity":"LOW"}},{"cvssV2_0":{"version":"2.0","baseScore":1.7,"vectorString":"AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:ND/RC:UR"}}],"timeline":[{"time":"2026-02-28T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2026-02-28T01:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2026-02-28T15:28:27.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"Oneafter (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.348268","name":"VDB-348268 | ChaiScript boxed_number.hpp get_as memory corruption","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.348268","name":"VDB-348268 | CTI Indicators (IOB, IOC, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.761301","name":"Submit #761301 | ChaiScript develop branch Memory Corruption","tags":["third-party-advisory"]},{"url":"https://github.com/ChaiScript/ChaiScript/issues/635","tags":["issue-tracking"]},{"url":"https://github.com/ChaiScript/ChaiScript/issues/635#issue-3828258513","tags":["exploit","issue-tracking"]},{"url":"https://github.com/ChaiScript/ChaiScript/","tags":["product"]}]},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-03-02T00:55:10.402952Z","id":"CVE-2026-3382","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-03-06T14:52:28.017Z"}}]}}