Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-5232-1 | tinygltf security update |
EUVD |
EUVD-2022-42444 | The tinygltf library uses the C library function wordexp() to perform file path expansion on untrusted paths that are provided from the input file. This function allows for command injection by using backticks. An attacker could craft an untrusted path input that would result in a path expansion. We recommend upgrading to 2.6.0 or past commit 52ff00a38447f06a17eab1caa2cf0730a119c751 |
Ubuntu USN |
USN-7129-1 | TinyGLTF vulnerability |
Mon, 21 Apr 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: Google
Published:
Updated: 2025-04-21T13:50:13.934Z
Reserved: 2022-08-26T00:00:00.000Z
Link: CVE-2022-3008
Updated: 2024-08-03T00:53:00.588Z
Status : Modified
Published: 2022-09-05T09:15:10.110
Modified: 2024-11-21T07:18:37.753
Link: CVE-2022-3008
No data.
OpenCVE Enrichment
No data.
Debian DSA
EUVD
Ubuntu USN