CVE-2026-0708
Libucl: libucl: denial of service via embedded null byte in ucl input
CVSS Score
8.3
EPSS Score
0.0%
EPSS Percentile
0th
A flaw was found in libucl. A remote attacker could exploit this by providing a specially crafted Universal Configuration Language (UCL) input that contains a key with an embedded null byte. This can cause a segmentation fault (SEGV fault) in the `ucl_object_emit` function when parsing and emitting the object, leading to a Denial of Service (DoS) for the affected system.
| CWE | CWE-125 |
| Vendor | libucl |
| Product | libucl |
| Published | Mar 17, 2026 |
| Last Updated | Mar 17, 2026 |
Stay Ahead of the Next One
Get instant alerts for libucl libucl
Be the first to know when new high vulnerabilities affecting libucl libucl are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
CVSS v3 Breakdown
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:H Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Unchanged
Confidentiality
High
Integrity
Low
Availability
High
Affected Versions
libucl / libucl
3e7f023e184e06f30fb5792dacd9dd0f8b692f1b