Subscriptions
Tracking
Sign in to view the affected projects.
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Thu, 05 Mar 2026 01:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Solhsa
Solhsa soloud |
|
| CPEs | cpe:2.3:a:solhsa:soloud:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Solhsa
Solhsa soloud |
Mon, 02 Mar 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 02 Mar 2026 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Jarikomppa
Jarikomppa soloud |
|
| Vendors & Products |
Jarikomppa
Jarikomppa soloud |
Sun, 01 Mar 2026 12:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability was detected in jarikomppa soloud up to 20200207. This affects the function SoLoud::Wav::loadwav of the file src/audiosource/wav/soloud_wav.cpp of the component WAV File Parser. Performing a manipulation results in memory corruption. The attack must be initiated from a local position. The exploit is now public and may be used. The project was informed of the problem early through an issue report but has not responded yet. | |
| Title | jarikomppa soloud WAV File soloud_wav.cpp loadwav memory corruption | |
| Weaknesses | CWE-119 | |
| References |
| |
| Metrics |
cvssV2_0
|
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2026-03-02T18:12:02.815Z
Reserved: 2026-02-28T17:07:42.014Z
Link: CVE-2026-3394
Updated: 2026-03-02T18:11:58.142Z
Status : Analyzed
Published: 2026-03-01T13:16:15.680
Modified: 2026-03-05T01:32:30.180
Link: CVE-2026-3394
No data.
OpenCVE Enrichment
Updated: 2026-03-02T12:04:00Z