Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Tue, 31 Mar 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
ssvc
|
Tue, 24 Mar 2026 10:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Jkuhlmann
Jkuhlmann cgltf |
|
| Vendors & Products |
Jkuhlmann
Jkuhlmann cgltf |
Mon, 23 Mar 2026 19:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
Mon, 23 Mar 2026 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 23 Mar 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | cgltf version 1.15 and prior contain an integer overflow vulnerability in the cgltf_validate() function when validating sparse accessors that allows attackers to trigger out-of-bounds reads by supplying crafted glTF/GLB input files with attacker-controlled size values. Attackers can exploit unchecked arithmetic operations in sparse accessor validation to cause heap buffer over-reads in cgltf_calc_index_bound(), resulting in denial of service crashes and potential memory disclosure. | |
| Title | jkuhlmann / cgltf <= 1.15 Sparse Accessor Validation Integer Overflow | |
| Weaknesses | CWE-190 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-03-31T15:12:59.848Z
Reserved: 2026-03-16T18:11:41.758Z
Link: CVE-2026-32845
Updated: 2026-03-23T17:11:44.957Z
Status : Deferred
Published: 2026-03-23T16:16:48.583
Modified: 2026-05-01T15:21:32.393
Link: CVE-2026-32845
No data.
OpenCVE Enrichment
Updated: 2026-03-25T20:37:30Z