Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Fri, 13 Mar 2026 10:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Rxi
Rxi fe |
|
| Vendors & Products |
Rxi
Rxi fe |
Thu, 12 Mar 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 12 Mar 2026 07:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability was determined in rxi fe up to ed4cda96bd582cbb08520964ba627efb40f3dd91. The impacted element is the function read_ of the file src/fe.c. This manipulation with the input 1 causes out-of-bounds read. The attack requires local access. The exploit has been publicly disclosed and may be utilized. This product uses a rolling release model to deliver continuous updates. As a result, specific version information for affected or updated releases is not available. The project was informed of the problem early through an issue report but has not responded yet. | |
| Title | rxi fe fe.c read_ out-of-bounds | |
| Weaknesses | CWE-119 CWE-125 |
|
| References |
| |
| Metrics |
cvssV2_0
|
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2026-03-12T15:02:42.185Z
Reserved: 2026-03-11T19:05:43.939Z
Link: CVE-2026-4012
Updated: 2026-03-12T15:02:36.526Z
Status : Deferred
Published: 2026-03-12T08:16:11.593
Modified: 2026-04-22T21:30:26.497
Link: CVE-2026-4012
No data.
OpenCVE Enrichment
Updated: 2026-03-20T15:50:00Z