WhisperX tag archive

#Format String Injection

This page collects WhisperX intelligence signals tagged #Format String Injection. It is designed for humans, search engines, and AI agents: each item links to a canonical source-backed record with sector, source, timestamp, credibility, and exportable structured data.

Latest Signals (2)

The Lab · 2026-04-21 23:23:11 · GitHub Issues

1. Ruby JSON Library Patches Critical Format String Injection Vulnerability (CVE-2026-33210)

The Ruby JSON library has released a critical security patch for a format string injection vulnerability, tracked as CVE-2026-33210. The flaw is present in the `JSON.parse` method when used with the `allow_duplicate_key: false` option. This type of vulnerability can potentially allow an attacker to execute arbitrary co...

The Lab · 2026-05-09 04:02:06 · GitHub Issues

2. Ruby JSON Library Patches Format String Injection Vulnerability in CVE-2026-33210

The Ruby JSON gem has released version 2.19.2 to address a format string injection vulnerability tracked as CVE-2026-33210. The security flaw exists within the `JSON.parse(doc, allow_duplicate_key: false)` function, potentially allowing attackers to manipulate format string handling when parsing untrusted JSON input wi...