Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Mon, 12 Jan 2026 18:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Cmu
Cmu panda3d |
|
| CPEs | cpe:2.3:a:cmu:panda3d:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Cmu
Cmu panda3d |
|
| Metrics |
cvssV3_1
|
Thu, 08 Jan 2026 10:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Panda3d
Panda3d panda3d |
|
| Vendors & Products |
Panda3d
Panda3d panda3d |
Wed, 07 Jan 2026 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 07 Jan 2026 20:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Panda3D versions up to and including 1.10.16 egg-mkfont contains an uncontrolled format string vulnerability. The -gp (glyph pattern) command-line option is used directly as the format string for sprintf() with only a single argument supplied. If an attacker provides additional format specifiers, egg-mkfont may read unintended stack values and write the formatted output into generated .egg and .png files, resulting in disclosure of stack-resident memory and pointer values. | |
| Title | Panda3D <= 1.10.16 egg-mkfont Format String Information Disclosure | |
| Weaknesses | CWE-134 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-03-05T01:30:11.739Z
Reserved: 2026-01-06T16:47:17.183Z
Link: CVE-2026-22190
Updated: 2026-01-07T21:22:22.559Z
Status : Analyzed
Published: 2026-01-07T21:16:03.390
Modified: 2026-01-12T17:53:57.367
Link: CVE-2026-22190
No data.
OpenCVE Enrichment
Updated: 2026-04-16T18:30:10Z