Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2026-2653

Опубликовано: 18 фев. 2026
Источник: debian
EPSS Низкий

Описание

A security flaw has been discovered in admesh up to 0.98.5. This issue affects the function stl_check_normal_vector of the file src/normals.c. Performing a manipulation results in heap-based buffer overflow. The attack must be initiated from a local position. The exploit has been released to the public and may be used for attacks. It looks like this product is not really maintained anymore.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
admeshunfixedpackage
admeshno-dsatrixiepackage
admeshno-dsabookwormpackage
admeshpostponedbullseyepackage

Примечания

  • https://github.com/admesh/admesh/issues/65

EPSS

Процентиль: 0%
0.00005
Низкий

Связанные уязвимости

CVSS3: 5.3
ubuntu
около 1 месяца назад

A security flaw has been discovered in admesh up to 0.98.5. This issue affects the function stl_check_normal_vector of the file src/normals.c. Performing a manipulation results in heap-based buffer overflow. The attack must be initiated from a local position. The exploit has been released to the public and may be used for attacks. It looks like this product is not really maintained anymore.

CVSS3: 5.3
nvd
около 1 месяца назад

A security flaw has been discovered in admesh up to 0.98.5. This issue affects the function stl_check_normal_vector of the file src/normals.c. Performing a manipulation results in heap-based buffer overflow. The attack must be initiated from a local position. The exploit has been released to the public and may be used for attacks. It looks like this product is not really maintained anymore.

CVSS3: 5.3
github
около 1 месяца назад

A security flaw has been discovered in admesh up to 0.98.5. This issue affects the function stl_check_normal_vector of the file src/normals.c. Performing a manipulation results in heap-based buffer overflow. The attack must be initiated from a local position. The exploit has been released to the public and may be used for attacks. It looks like this product is not really maintained anymore.

EPSS

Процентиль: 0%
0.00005
Низкий