This issue affects UEVR: before 1.05.
Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
| Link | Providers |
|---|---|
| https://github.com/praydog/UEVR/pull/337 |
|
Tue, 27 Jan 2026 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 27 Jan 2026 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Praydog
Praydog uevr |
|
| Vendors & Products |
Praydog
Praydog uevr |
Tue, 27 Jan 2026 09:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Out-of-bounds Read vulnerability in praydog UEVR (dependencies/lua/src modules). This vulnerability is associated with program files lparser.C. This issue affects UEVR: before 1.05. | |
| Title | A heap-based buffer over-read that might affect a system that compiles untrusted Lua code in praydog/UEVR | |
| Weaknesses | CWE-125 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GovTech CSG
Published:
Updated: 2026-01-27T20:36:09.549Z
Reserved: 2026-01-27T08:48:56.893Z
Link: CVE-2026-24818
Updated: 2026-01-27T20:36:06.110Z
Status : Deferred
Published: 2026-01-27T09:15:52.383
Modified: 2026-04-15T00:35:42.020
Link: CVE-2026-24818
No data.
OpenCVE Enrichment
Updated: 2026-04-18T15:00:03Z