No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Tue, 17 Feb 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-787 | |
| CPEs | cpe:2.3:a:happyfish100:libfastcommon:*:*:*:*:*:*:*:* |
Mon, 09 Feb 2026 11:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Happyfish100
Happyfish100 libfastcommon |
|
| Vendors & Products |
Happyfish100
Happyfish100 libfastcommon |
Fri, 06 Feb 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 06 Feb 2026 11:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A security vulnerability has been detected in happyfish100 libfastcommon up to 1.0.84. Affected by this vulnerability is the function base64_decode of the file src/base64.c. The manipulation leads to stack-based buffer overflow. Local access is required to approach this attack. The exploit has been disclosed publicly and may be used. The identifier of the patch is 82f66af3e252e3e137dba0c3891570f085e79adf. Applying a patch is the recommended action to fix this issue. | |
| Title | happyfish100 libfastcommon base64.c base64_decode stack-based overflow | |
| Weaknesses | CWE-119 CWE-121 |
|
| References |
|
|
| Metrics |
cvssV2_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2026-02-06T13:08:43.137Z
Reserved: 2026-02-05T19:35:28.683Z
Link: CVE-2026-2016
Updated: 2026-02-06T13:08:33.216Z
Status : Analyzed
Published: 2026-02-06T12:16:26.073
Modified: 2026-02-17T19:11:30.800
Link: CVE-2026-2016
No data.
OpenCVE Enrichment
Updated: 2026-02-09T10:52:48Z