This issue affects cardboard: before 1.21.4.
Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
| Link | Providers |
|---|---|
| https://github.com/CardboardPowered/cardboard/pull/506 |
|
Tue, 27 Jan 2026 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 27 Jan 2026 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Cardboardpowered
Cardboardpowered cardboard |
|
| Vendors & Products |
Cardboardpowered
Cardboardpowered cardboard |
Tue, 27 Jan 2026 08:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in CardboardPowered cardboard (src/main/java/org/cardboardpowered/impl/world modules). This vulnerability is associated with program files WorldImpl.Java. This issue affects cardboard: before 1.21.4. | |
| Title | Chunk Unloading Security Vulnerability in CardboardPowered/cardboard | |
| Weaknesses | CWE-119 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GovTech CSG
Published:
Updated: 2026-01-27T21:39:21.583Z
Reserved: 2026-01-27T08:18:43.267Z
Link: CVE-2026-24794
Updated: 2026-01-27T21:10:11.365Z
Status : Deferred
Published: 2026-01-27T09:15:49.090
Modified: 2026-04-15T00:35:42.020
Link: CVE-2026-24794
No data.
OpenCVE Enrichment
Updated: 2026-04-18T15:00:03Z