Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Mon, 12 Jan 2026 18:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Cmu
Cmu panda3d |
|
| Weaknesses | CWE-787 | |
| CPEs | cpe:2.3:a:cmu:panda3d:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Cmu
Cmu panda3d |
|
| Metrics |
cvssV3_1
|
Thu, 08 Jan 2026 10:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Panda3d
Panda3d panda3d |
|
| Vendors & Products |
Panda3d
Panda3d panda3d |
Wed, 07 Jan 2026 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 07 Jan 2026 20:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Panda3D versions up to and including 1.10.16 egg-mkfont contains a stack-based buffer overflow vulnerability due to use of an unbounded sprintf() call with attacker-controlled input. When constructing glyph filenames, egg-mkfont formats a user-supplied glyph pattern (-gp) into a fixed-size stack buffer without length validation. Supplying an excessively long glyph pattern string can overflow the stack buffer, resulting in memory corruption and a deterministic crash. Depending on build configuration and execution environment, the overflow may also be exploitable for arbitrary code execution. | |
| Title | Panda3D <= 1.10.16 egg-mkfont Stack Buffer Overflow | |
| Weaknesses | CWE-121 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-03-05T01:30:10.932Z
Reserved: 2026-01-06T16:47:17.183Z
Link: CVE-2026-22189
Updated: 2026-01-07T21:21:26.312Z
Status : Analyzed
Published: 2026-01-07T21:16:03.067
Modified: 2026-01-12T17:59:18.370
Link: CVE-2026-22189
No data.
OpenCVE Enrichment
Updated: 2026-04-16T18:30:10Z