No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Mon, 11 May 2026 02:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Albertodemichelis
Albertodemichelis squirrel |
|
| Vendors & Products |
Albertodemichelis
Albertodemichelis squirrel |
Mon, 11 May 2026 01:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A flaw has been found in Squirrel up to 3.2. Impacted is the function validate_format in the library sqstdlib/sqstdstring.cpp. Executing a manipulation can lead to stack-based buffer overflow. The attack can only be executed locally. The exploit has been published and may be used. The project was informed of the problem early through an issue report but has not responded yet. | |
| Title | Squirrel sqstdstring.cpp validate_format stack-based overflow | |
| Weaknesses | CWE-119 CWE-121 |
|
| References |
| |
| Metrics |
cvssV2_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2026-05-11T00:45:11.651Z
Reserved: 2026-05-10T15:00:09.852Z
Link: CVE-2026-8258
No data.
Status : Received
Published: 2026-05-11T02:16:27.250
Modified: 2026-05-11T02:16:27.250
Link: CVE-2026-8258
No data.
OpenCVE Enrichment
Updated: 2026-05-11T02:30:25Z