Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Thu, 05 Mar 2026 01:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Solhsa
Solhsa soloud |
|
| CPEs | cpe:2.3:a:solhsa:soloud:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Solhsa
Solhsa soloud |
Mon, 02 Mar 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 02 Mar 2026 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Jarikomppa
Jarikomppa soloud |
|
| Vendors & Products |
Jarikomppa
Jarikomppa soloud |
Sun, 01 Mar 2026 12:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability was detected in jarikomppa soloud up to 20200207. This affects the function SoLoud::Wav::loadwav of the file src/audiosource/wav/soloud_wav.cpp of the component WAV File Parser. Performing a manipulation results in memory corruption. The attack must be initiated from a local position. The exploit is now public and may be used. The project was informed of the problem early through an issue report but has not responded yet. | |
| Title | jarikomppa soloud WAV File soloud_wav.cpp loadwav memory corruption | |
| Weaknesses | CWE-119 | |
| References |
| |
| Metrics |
cvssV2_0
|
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2026-03-02T18:12:02.815Z
Reserved: 2026-02-28T17:07:42.014Z
Link: CVE-2026-3394
Updated: 2026-03-02T18:11:58.142Z
Status : Analyzed
Published: 2026-03-01T13:16:15.680
Modified: 2026-04-29T01:00:01.613
Link: CVE-2026-3394
No data.
OpenCVE Enrichment
Updated: 2026-03-02T12:04:00Z