CVE-2026-3383
ChaiScript boxed_number.hpp go divide by zero
CVSS Score
3.3
EPSS Score
0.0%
EPSS Percentile
0th
A weakness has been identified in ChaiScript up to 6.1.0. This affects the function chaiscript::Boxed_Number::go of the file include/chaiscript/dispatchkit/boxed_number.hpp. Executing a manipulation can lead to divide by zero. The attack requires local access. The exploit has been made available to the public and could be used for attacks. The project was informed of the problem early through an issue report but has not responded yet.
| CWE | CWE-369 CWE-404 |
| Vendor | n/a |
| Product | chaiscript |
| Published | Mar 1, 2026 |
| Last Updated | Mar 2, 2026 |
Stay Ahead of the Next One
Get instant alerts for n/a chaiscript
Be the first to know when new low vulnerabilities affecting n/a chaiscript are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
CVSS v3 Breakdown
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:X/RC:R Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
Affected Versions
n/a / ChaiScript
6.0 6.1.0
References
vuldb.com: https://vuldb.com/?id.348269 vuldb.com: https://vuldb.com/?ctiid.348269 vuldb.com: https://vuldb.com/?submit.761302 github.com: https://github.com/ChaiScript/ChaiScript/issues/634 github.com: https://github.com/ChaiScript/ChaiScript/issues/634#issue-3828234470 github.com: https://github.com/ChaiScript/ChaiScript/
Credits
๐ Oneafter (VulDB User)