๐Ÿ” CVE Alert

CVE-2026-22190

UNKNOWN 0.0

Panda3D <= 1.10.16 egg-mkfont Format String Information Disclosure

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

Panda3D versions up to and including 1.10.16 egg-mkfont contains an uncontrolled format string vulnerability. The -gp (glyph pattern) command-line option is used directly as the format string for sprintf() with only a single argument supplied. If an attacker provides additional format specifiers, egg-mkfont may read unintended stack values and write the formatted output into generated .egg and .png files, resulting in disclosure of stack-resident memory and pointer values.

CWE CWE-134
Vendor panda3d
Product panda3d
Published Jan 7, 2026
Last Updated Mar 5, 2026
Stay Ahead of the Next One

Get instant alerts for panda3d panda3d

Be the first to know when new unknown vulnerabilities affecting panda3d panda3d are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Panda3D / Panda3D
0 โ‰ค 1.10.16

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
seclists.org: https://seclists.org/fulldisclosure/2026/Jan/11 panda3d.org: https://www.panda3d.org/ github.com: https://github.com/panda3d/panda3d vulncheck.com: https://www.vulncheck.com/advisories/panda3d-egg-mkfont-format-string-information-disclosure

Credits

Ron Edgerson