No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Mon, 23 Feb 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 23 Feb 2026 15:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Aardappel
Aardappel lobster |
|
| Vendors & Products |
Aardappel
Aardappel lobster |
Sat, 21 Feb 2026 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A security vulnerability has been detected in aardappel lobster up to 2025.4. This impacts the function lobster::TypeName in the library dev/src/lobster/idents.h. Such manipulation leads to uncontrolled recursion. The attack can only be performed from a local environment. The exploit has been disclosed publicly and may be used. Upgrading to version 2026.1 will fix this issue. The name of the patch is 8ba49f98ccfc9734ef352146806433a41d9f9aa6. It is advisable to upgrade the affected component. | |
| Title | aardappel lobster idents.h TypeName recursion | |
| Weaknesses | CWE-404 CWE-674 |
|
| References |
|
|
| Metrics |
cvssV2_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2026-02-23T19:30:34.090Z
Reserved: 2026-02-20T17:07:30.695Z
Link: CVE-2026-2887
Updated: 2026-02-23T19:30:26.428Z
Status : Awaiting Analysis
Published: 2026-02-21T21:16:11.420
Modified: 2026-02-23T18:13:53.397
Link: CVE-2026-2887
No data.
OpenCVE Enrichment
Updated: 2026-02-23T14:29:57Z