Ad

CVE-2026-0708

HIGH CVSS 3.1: 8.3 EPSS 0.09%
Updated Mar 17, 2026
libucl
Parameter Value
CVSS 8.3 (HIGH)
Type CWE-125 (Out-of-bounds Read)
Vendor libucl
Public PoC No

A flaw was found in libucl. A remote attacker could exploit this by providing a specially crafted Universal Configuration Language (UCL) input that contains a key with an embedded null byte. This can cause a segmentation fault (SEGV fault) in the `ucl_object_emit` function when parsing and emitting the object, leading to a Denial of Service (DoS) for the affected system.

Attack Parameters

Attack Vector
Network
Can be exploited remotely
Attack Complexity
Low
Easy to exploit
Privileges Required
None
No privileges needed
User Interaction
Required
User action required

Impact Assessment

Confidentiality
High
Complete data leak
Integrity
Low
Partial data modification
Availability
High
Complete denial of service

CVSS Vector v3.1

Weakness Type (CWE)