A vulnerability was found in janet-lang janet up to 1.40.1. It has been declared as problematic. This impacts the function janetc_if of the file src/core/specials.c. Executing a manipulation can lead to out-of-bounds read.
This vulnerability is registered as CVE-2026-2242. The attack needs to be launched locally. Furthermore, an exploit is available.
It is advisable to implement a patch to correct this issue.
A vulnerability was found in janet-lang janet up to 1.40.1. It has been classified as problematic. This affects the function os_strftime of the file src/core/os.c. Performing a manipulation results in out-of-bounds read.
This vulnerability is cataloged as CVE-2026-2241. The attack must be initiated from a local position. Furthermore, there is an exploit available.
To fix this issue, it is recommended to deploy a patch.
A vulnerability was found in janet-lang janet up to 1.40.1 and classified as problematic. The impacted element is the function janetc_pop_funcdef of the file src/core/compile.c. Such manipulation leads to out-of-bounds read.
This vulnerability is listed as CVE-2026-2240. The attack must be carried out locally. In addition, an exploit is available.
A patch should be applied to remediate this issue.
A vulnerability has been found in pydantic pydantic-ai and classified as critical. The affected element is an unknown function of the component Localhost Interface. This manipulation causes server-side request forgery.
This vulnerability is tracked as CVE-2026-25904. The attack is possible to be carried out remotely. No exploit exists.
A vulnerability, which was classified as problematic, was found in mcp-run-python. Impacted is the function runPython/runPythonAsync of the component Pyodide API. The manipulation results in improper isolation or compartmentalization.
This vulnerability is identified as CVE-2026-25905. The attack can be executed remotely. There is not any exploit available.