Search criteria

2 vulnerabilities by aardappel

CVE-2026-2259 (GCVE-0-2026-2259)

Vulnerability from cvelistv5 – Published: 2026-02-10 02:32 – Updated: 2026-02-10 20:19 X_Open Source
VLAI?
Title
aardappel lobster Parsing parser.h ParseStatements memory corruption
Summary
A vulnerability has been found in aardappel lobster up to 2025.4. Affected by this issue is the function lobster::Parser::ParseStatements in the library dev/src/lobster/parser.h of the component Parsing. The manipulation leads to memory corruption. The attack can only be performed from a local environment. The exploit has been disclosed to the public and may be used. The identifier of the patch is 2f45fe860d00990e79e13250251c1dde633f1f89. Applying a patch is the recommended action to fix this issue.
CWE
Assigner
Impacted products
Vendor Product Version
aardappel lobster Affected: 2025.0
Affected: 2025.1
Affected: 2025.2
Affected: 2025.3
Affected: 2025.4
Create a notification for this product.
Credits
Oneafter (VulDB User)
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2026-2259",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2026-02-10T20:19:18.928967Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2026-02-10T20:19:24.411Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "modules": [
            "Parsing"
          ],
          "product": "lobster",
          "vendor": "aardappel",
          "versions": [
            {
              "status": "affected",
              "version": "2025.0"
            },
            {
              "status": "affected",
              "version": "2025.1"
            },
            {
              "status": "affected",
              "version": "2025.2"
            },
            {
              "status": "affected",
              "version": "2025.3"
            },
            {
              "status": "affected",
              "version": "2025.4"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "reporter",
          "value": "Oneafter (VulDB User)"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A vulnerability has been found in aardappel lobster up to 2025.4. Affected by this issue is the function lobster::Parser::ParseStatements in the library dev/src/lobster/parser.h of the component Parsing. The manipulation leads to memory corruption. The attack can only be performed from a local environment. The exploit has been disclosed to the public and may be used. The identifier of the patch is 2f45fe860d00990e79e13250251c1dde633f1f89. Applying a patch is the recommended action to fix this issue."
        }
      ],
      "metrics": [
        {
          "cvssV4_0": {
            "baseScore": 4.8,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P",
            "version": "4.0"
          }
        },
        {
          "cvssV3_1": {
            "baseScore": 3.3,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C",
            "version": "3.1"
          }
        },
        {
          "cvssV3_0": {
            "baseScore": 3.3,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C",
            "version": "3.0"
          }
        },
        {
          "cvssV2_0": {
            "baseScore": 1.7,
            "vectorString": "AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C",
            "version": "2.0"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-119",
              "description": "Memory Corruption",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2026-02-10T02:32:08.234Z",
        "orgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
        "shortName": "VulDB"
      },
      "references": [
        {
          "name": "VDB-345006 | aardappel lobster Parsing parser.h ParseStatements memory corruption",
          "tags": [
            "vdb-entry",
            "technical-description"
          ],
          "url": "https://vuldb.com/?id.345006"
        },
        {
          "name": "VDB-345006 | CTI Indicators (IOB, IOC, IOA)",
          "tags": [
            "signature",
            "permissions-required"
          ],
          "url": "https://vuldb.com/?ctiid.345006"
        },
        {
          "name": "Submit #753168 | aardappel lobster 8ba49f9 Memory Corruption",
          "tags": [
            "third-party-advisory"
          ],
          "url": "https://vuldb.com/?submit.753168"
        },
        {
          "tags": [
            "issue-tracking"
          ],
          "url": "https://github.com/aardappel/lobster/issues/396"
        },
        {
          "tags": [
            "issue-tracking"
          ],
          "url": "https://github.com/aardappel/lobster/issues/396#issuecomment-3849019040"
        },
        {
          "tags": [
            "exploit"
          ],
          "url": "https://github.com/oneafter/0204/blob/main/lob2/repro.lobster"
        },
        {
          "tags": [
            "patch"
          ],
          "url": "https://github.com/aardappel/lobster/commit/2f45fe860d00990e79e13250251c1dde633f1f89"
        },
        {
          "tags": [
            "product"
          ],
          "url": "https://github.com/aardappel/lobster/"
        }
      ],
      "tags": [
        "x_open-source"
      ],
      "timeline": [
        {
          "lang": "en",
          "time": "2026-02-09T00:00:00.000Z",
          "value": "Advisory disclosed"
        },
        {
          "lang": "en",
          "time": "2026-02-09T01:00:00.000Z",
          "value": "VulDB entry created"
        },
        {
          "lang": "en",
          "time": "2026-02-09T18:01:25.000Z",
          "value": "VulDB entry last update"
        }
      ],
      "title": "aardappel lobster Parsing parser.h ParseStatements memory corruption"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
    "assignerShortName": "VulDB",
    "cveId": "CVE-2026-2259",
    "datePublished": "2026-02-10T02:32:08.234Z",
    "dateReserved": "2026-02-09T16:56:09.456Z",
    "dateUpdated": "2026-02-10T20:19:24.411Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2026-2258 (GCVE-0-2026-2258)

Vulnerability from cvelistv5 – Published: 2026-02-10 00:02 – Updated: 2026-02-10 16:42 X_Open Source
VLAI?
Title
aardappel lobster wfc.h WaveFunctionCollapse memory corruption
Summary
A flaw has been found in aardappel lobster up to 2025.4. Affected by this vulnerability is the function WaveFunctionCollapse in the library dev/src/lobster/wfc.h. Executing a manipulation can lead to memory corruption. The attack can only be executed locally. The exploit has been published and may be used. This patch is called c2047a33e1ac2c42ab7e8704b33f7ea518a11ffd. It is advisable to implement a patch to correct this issue.
CWE
Assigner
Impacted products
Vendor Product Version
aardappel lobster Affected: 2025.0
Affected: 2025.1
Affected: 2025.2
Affected: 2025.3
Affected: 2025.4
Create a notification for this product.
Credits
Oneafter (VulDB User)
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2026-2258",
                "options": [
                  {
                    "Exploitation": "poc"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2026-02-10T16:35:38.260675Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2026-02-10T16:42:37.443Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "lobster",
          "vendor": "aardappel",
          "versions": [
            {
              "status": "affected",
              "version": "2025.0"
            },
            {
              "status": "affected",
              "version": "2025.1"
            },
            {
              "status": "affected",
              "version": "2025.2"
            },
            {
              "status": "affected",
              "version": "2025.3"
            },
            {
              "status": "affected",
              "version": "2025.4"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "reporter",
          "value": "Oneafter (VulDB User)"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A flaw has been found in aardappel lobster up to 2025.4. Affected by this vulnerability is the function WaveFunctionCollapse in the library dev/src/lobster/wfc.h. Executing a manipulation can lead to memory corruption. The attack can only be executed locally. The exploit has been published and may be used. This patch is called c2047a33e1ac2c42ab7e8704b33f7ea518a11ffd. It is advisable to implement a patch to correct this issue."
        }
      ],
      "metrics": [
        {
          "cvssV4_0": {
            "baseScore": 4.8,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P",
            "version": "4.0"
          }
        },
        {
          "cvssV3_1": {
            "baseScore": 3.3,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C",
            "version": "3.1"
          }
        },
        {
          "cvssV3_0": {
            "baseScore": 3.3,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C",
            "version": "3.0"
          }
        },
        {
          "cvssV2_0": {
            "baseScore": 1.7,
            "vectorString": "AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C",
            "version": "2.0"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-119",
              "description": "Memory Corruption",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2026-02-10T00:02:09.801Z",
        "orgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
        "shortName": "VulDB"
      },
      "references": [
        {
          "name": "VDB-345005 | aardappel lobster wfc.h WaveFunctionCollapse memory corruption",
          "tags": [
            "vdb-entry",
            "technical-description"
          ],
          "url": "https://vuldb.com/?id.345005"
        },
        {
          "name": "VDB-345005 | CTI Indicators (IOB, IOC, IOA)",
          "tags": [
            "signature",
            "permissions-required"
          ],
          "url": "https://vuldb.com/?ctiid.345005"
        },
        {
          "name": "Submit #753167 | aardappel lobster 2f45fe8 Return of Stack Variable Address",
          "tags": [
            "third-party-advisory"
          ],
          "url": "https://vuldb.com/?submit.753167"
        },
        {
          "tags": [
            "issue-tracking"
          ],
          "url": "https://github.com/aardappel/lobster/issues/395"
        },
        {
          "tags": [
            "issue-tracking"
          ],
          "url": "https://github.com/aardappel/lobster/issues/395#issuecomment-3849012938"
        },
        {
          "tags": [
            "exploit"
          ],
          "url": "https://github.com/oneafter/0204/blob/main/lob1/repro.lobster"
        },
        {
          "tags": [
            "patch"
          ],
          "url": "https://github.com/aardappel/lobster/commit/c2047a33e1ac2c42ab7e8704b33f7ea518a11ffd"
        },
        {
          "tags": [
            "product"
          ],
          "url": "https://github.com/aardappel/lobster/"
        }
      ],
      "tags": [
        "x_open-source"
      ],
      "timeline": [
        {
          "lang": "en",
          "time": "2026-02-09T00:00:00.000Z",
          "value": "Advisory disclosed"
        },
        {
          "lang": "en",
          "time": "2026-02-09T01:00:00.000Z",
          "value": "VulDB entry created"
        },
        {
          "lang": "en",
          "time": "2026-02-09T17:59:18.000Z",
          "value": "VulDB entry last update"
        }
      ],
      "title": "aardappel lobster wfc.h WaveFunctionCollapse memory corruption"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
    "assignerShortName": "VulDB",
    "cveId": "CVE-2026-2258",
    "datePublished": "2026-02-10T00:02:09.801Z",
    "dateReserved": "2026-02-09T16:54:12.927Z",
    "dateUpdated": "2026-02-10T16:42:37.443Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}