This issue affects modizer: before v4.3.
Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
| Link | Providers |
|---|---|
| https://github.com/yoyofr/modizer/pull/141 |
|
Tue, 24 Mar 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 24 Mar 2026 10:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Yoyofr
Yoyofr modizer |
|
| Vendors & Products |
Yoyofr
Yoyofr modizer |
Tue, 24 Mar 2026 03:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in yoyofr modizer (libs/libopenmpt/openmpt-trunk/include/premake/contrib/curl/lib modules). This vulnerability is associated with program files imap.Cā. This issue affects modizer: before v4.3. | |
| Title | Heap Buffer Overflow in yoyofr/modizer | |
| Weaknesses | CWE-119 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GovTech CSG
Published:
Updated: 2026-03-24T14:37:08.508Z
Reserved: 2026-03-24T03:02:46.980Z
Link: CVE-2026-4734
Updated: 2026-03-24T14:37:05.580Z
Status : Deferred
Published: 2026-03-24T04:17:25.937
Modified: 2026-04-30T16:01:57.470
Link: CVE-2026-4734
No data.
OpenCVE Enrichment
Updated: 2026-03-25T20:40:23Z