Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-mmrr-c2j6-cqfp

Опубликовано: 07 янв. 2026
Источник: github
Github: Не прошло ревью
CVSS4: 5.1
CVSS3: 7.5

Описание

Panda3D versions up to and including 1.10.16 egg-mkfont contains an uncontrolled format string vulnerability. The -gp (glyph pattern) command-line option is used directly as the format string for sprintf() with only a single argument supplied. If an attacker provides additional format specifiers, egg-mkfont may read unintended stack values and write the formatted output into generated .egg and .png files, resulting in disclosure of stack-resident memory and pointer values.

Panda3D versions up to and including 1.10.16 egg-mkfont contains an uncontrolled format string vulnerability. The -gp (glyph pattern) command-line option is used directly as the format string for sprintf() with only a single argument supplied. If an attacker provides additional format specifiers, egg-mkfont may read unintended stack values and write the formatted output into generated .egg and .png files, resulting in disclosure of stack-resident memory and pointer values.

EPSS

Процентиль: 9%
0.00033
Низкий

5.1 Medium

CVSS4

7.5 High

CVSS3

Дефекты

CWE-134

Связанные уязвимости

CVSS3: 7.5
nvd
около 1 месяца назад

Panda3D versions up to and including 1.10.16 egg-mkfont contains an uncontrolled format string vulnerability. The -gp (glyph pattern) command-line option is used directly as the format string for sprintf() with only a single argument supplied. If an attacker provides additional format specifiers, egg-mkfont may read unintended stack values and write the formatted output into generated .egg and .png files, resulting in disclosure of stack-resident memory and pointer values.

EPSS

Процентиль: 9%
0.00033
Низкий

5.1 Medium

CVSS4

7.5 High

CVSS3

Дефекты

CWE-134