Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Wed, 25 Feb 2026 14:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:janet-lang:janet:*:*:*:*:*:*:*:* |
Tue, 10 Feb 2026 12:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Janet-lang
Janet-lang janet |
|
| Vendors & Products |
Janet-lang
Janet-lang janet |
Mon, 09 Feb 2026 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 09 Feb 2026 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability was found in janet-lang janet up to 1.40.1. This affects the function os_strftime of the file src/core/os.c. Performing a manipulation results in out-of-bounds read. The attack must be initiated from a local position. The exploit has been made public and could be used. The patch is named 0f285855f0e34f9183956be5f16e045f54626bff. To fix this issue, it is recommended to deploy a patch. | |
| Title | janet-lang janet os.c os_strftime out-of-bounds | |
| Weaknesses | CWE-119 CWE-125 |
|
| References |
|
|
| Metrics |
cvssV2_0
|
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2026-02-23T10:00:21.668Z
Reserved: 2026-02-09T09:38:29.872Z
Link: CVE-2026-2241
Updated: 2026-02-09T16:39:18.899Z
Status : Analyzed
Published: 2026-02-09T18:16:08.660
Modified: 2026-04-29T01:00:01.613
Link: CVE-2026-2241
No data.
OpenCVE Enrichment
Updated: 2026-04-18T13:15:25Z