{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-04T15:12:28.075","vulnerabilities":[{"cve":{"id":"CVE-2022-38072","sourceIdentifier":"talos-cna@cisco.com","published":"2023-04-03T16:15:07.343","lastModified":"2024-11-21T07:15:43.317","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"An improper array index validation vulnerability exists in the stl_fix_normal_directions functionality of ADMesh Master Commit 767a105 and v0.98.4. A specially-crafted stl file can lead to a heap buffer overflow. An attacker can provide a malicious file to trigger this vulnerability."}],"metrics":{"cvssMetricV31":[{"source":"talos-cna@cisco.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L","baseScore":6.5,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"LOW","availabilityImpact":"LOW"},"exploitabilityScore":3.9,"impactScore":2.5},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","baseScore":8.8,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.9}]},"weaknesses":[{"source":"talos-cna@cisco.com","type":"Secondary","description":[{"lang":"en","value":"CWE-118"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-129"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:admesh_project:admesh:0.98.4:*:*:*:*:*:*:*","matchCriteriaId":"CA8A8D5A-8011-49C7-9527-213CD58D0AD4"},{"vulnerable":true,"criteria":"cpe:2.3:a:admesh_project:admesh:2022-11-18:*:*:*:*:*:*:*","matchCriteriaId":"784F7EAF-BC6F-421B-8B95-B15CC7A331D0"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:slic3r:libslic3r:b1a5500:*:*:*:*:*:*:*","matchCriteriaId":"2A6DF928-F3A0-46D0-9806-75464C70DD9D"}]}]}],"references":[{"url":"https://github.com/admesh/admesh/commit/5fab257268a0ee6f832c18d72af89810a29fbd5f","source":"talos-cna@cisco.com","tags":["Patch"]},{"url":"https://talosintelligence.com/vulnerability_reports/TALOS-2022-1594","source":"talos-cna@cisco.com","tags":["Exploit","Technical Description","Third Party Advisory"]},{"url":"https://github.com/admesh/admesh/commit/5fab257268a0ee6f832c18d72af89810a29fbd5f","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"]},{"url":"https://talosintelligence.com/vulnerability_reports/TALOS-2022-1594","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Technical Description","Third Party Advisory"]},{"url":"https://www.talosintelligence.com/vulnerability_reports/TALOS-2022-1594","source":"af854a3a-2127-422b-91ae-364da2661108"}]}}]}