Monitor vulnerabilities like this one. Sign up free to get alerted when software you use is affected.
4.8

Pocketlang May Cause Data Corruption with Large Input

CVE-2026-4010
Summary

A security issue in Pocketlang could allow an attacker to intentionally cause data corruption on a local system. This means that an attacker could potentially harm the system by feeding it an extremely large amount of data. It's essential to keep in mind that the project doesn't track versions, so it's unclear which versions are affected. Until further information is available, it's best to exercise caution when using Pocketlang.

Original title
A vulnerability was found in ThakeeNathees pocketlang up to cc73ca61b113d48ee130d837a7a8b145e41de5ce. The affected element is the function pkByteBufferAddString. The manipulation of the argument le...
Original description
A vulnerability was found in ThakeeNathees pocketlang up to cc73ca61b113d48ee130d837a7a8b145e41de5ce. The affected element is the function pkByteBufferAddString. The manipulation of the argument length with the input 4294967290 results in memory corruption. The attack requires a local approach. The exploit has been made public and could be used. This product does not use versioning. This is why information about affected and unaffected releases are unavailable. The project was informed of the problem early through an issue report but has not responded yet.
nvd CVSS2.0 1.7
nvd CVSS3.1 3.3
nvd CVSS4.0 4.8
Vulnerability type
CWE-119 Buffer Overflow
Published: 12 Mar 2026 · Updated: 13 Mar 2026 · First seen: 12 Mar 2026