CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
LOW
Availability Impact
LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L
AI Score
Confidence
High
EPSS
Percentile
54.9%
An improper array index validation vulnerability exists in the stl_fix_normal_directions functionality of ADMesh Master Commit 767a105 and v0.98.4. A specially-crafted stl file can lead to a heap buffer overflow. An attacker can provide a malicious file to trigger this vulnerability.
[
{
"vendor": "ADMesh",
"product": "ADMesh",
"versions": [
{
"version": "Master Commit 767a105",
"status": "affected"
},
{
"version": "v0.98.4",
"status": "affected"
}
]
},
{
"vendor": "ADMesh",
"product": "ADMesh",
"versions": [
{
"version": "Master Commit 767a105",
"status": "affected"
},
{
"version": "v0.98.4",
"status": "affected"
}
]
},
{
"vendor": "ADMesh",
"product": "ADMesh",
"versions": [
{
"version": "Master Commit 767a105",
"status": "affected"
},
{
"version": "v0.98.4",
"status": "affected"
}
]
},
{
"vendor": "Slic3r",
"product": "libslic3r",
"versions": [
{
"version": "Master Commit b1a5500",
"status": "affected"
}
]
}
]
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
LOW
Availability Impact
LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L
AI Score
Confidence
High
EPSS
Percentile
54.9%