CVE-2026-36189

Published: Mag 21, 2026 Last Modified: Mag 21, 2026
ExploitDB:
Other exploit source:
Google Dorks:
MEDIUM 6,2
Source: 134c704f-9b21-4f2e-91b3-4a467353bcc0
Attack Vector: local
Attack Complexity: low
Privileges Required: none
User Interaction: none
Scope: unchanged
Confidentiality: none
Integrity: none
Availability: high

Description

AI Translation Available

Buffer Overflow vulnerability in Uncrustify Project Affected v.Uncrustify_d-0.82.0-132-bcc41cbdc and Fixed in commit 68e67b9a1435a1bb173b106fedb4a4f510972bdc allows a local attacker to cause a denial of service via the check_template.cpp, check_template function, tokenize_cleanup function, uncrustify executable components

120

Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')

Incomplete
Common Consequences
Security Scopes Affected:
Integrity Confidentiality Availability
Potential Impacts:
Modify Memory Execute Unauthorized Code Or Commands Dos: Crash, Exit, Or Restart Dos: Resource Consumption (Cpu)
Applicable Platforms
Languages: Memory-Unsafe, C, C++, Assembly
View CWE Details
https://gist.github.com/Criticayon/5da6d6c9cf068e494347c659d01982a9
https://github.com/uncrustify/uncrustify%2Chttps://github.com/uncrustify/uncrus…
https://github.com/uncrustify/uncrustify/pull/4641