Debian Nltk vulnerabilities

12 known vulnerabilities affecting debian/nltk.

Total CVEs
12
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
CRITICAL3HIGH7MEDIUM1LOW1

Vulnerabilities

Page 1 of 1
CVE-2026-0848CRITICALCVSS 10.0fixed in nltk 3.9.3-1 (forky)2026
CVE-2026-0848 [CRITICAL] CVE-2026-0848: nltk - NLTK versions <=3.9.2 are vulnerable to arbitrary code execution due to improper... NLTK versions <=3.9.2 are vulnerable to arbitrary code execution due to improper input validation in the StanfordSegmenter module. The module dynamically loads external Java .jar files without verification or sandboxing. An attacker can supply or replace the JAR file, enabling the execution of arbitrary Java bytecode at import time. This vulnerability can be exploite
debian
CVE-2026-33231HIGHCVSS 7.52026
CVE-2026-33231 [HIGH] CVE-2026-33231: nltk - NLTK (Natural Language Toolkit) is a suite of open source Python modules, data s... NLTK (Natural Language Toolkit) is a suite of open source Python modules, data sets, and tutorials supporting research and development in Natural Language Processing. In versions 3.9.3 and prior, `nltk.app.wordnet_app` allows unauthenticated remote shutdown of the local WordNet Browser HTTP server when it is started in its default mode. A simple `GET /SHUTDOWN%20THE%20
debian
CVE-2026-33236HIGHCVSS 8.12026
CVE-2026-33236 [HIGH] CVE-2026-33236: nltk - NLTK (Natural Language Toolkit) is a suite of open source Python modules, data s... NLTK (Natural Language Toolkit) is a suite of open source Python modules, data sets, and tutorials supporting research and development in Natural Language Processing. In versions 3.9.3 and prior, the NLTK downloader does not validate the `subdir` and `id` attributes when processing remote XML index files. Attackers can control a remote XML index server to provide malic
debian
CVE-2026-0846HIGHCVSS 8.6fixed in nltk 3.9.3-1 (forky)2026
CVE-2026-0846 [HIGH] CVE-2026-0846: nltk - A vulnerability in the `filestring()` function of the `nltk.util` module in nltk... A vulnerability in the `filestring()` function of the `nltk.util` module in nltk version 3.9.2 allows arbitrary file read due to improper validation of input paths. The function directly opens files specified by user input without sanitization, enabling attackers to access sensitive system files by providing absolute paths or traversal paths. This vulnerability can be ex
debian
CVE-2026-0847HIGHCVSS 8.6fixed in nltk 3.9.3-1 (forky)2026
CVE-2026-0847 [HIGH] CVE-2026-0847: nltk - A vulnerability in NLTK versions up to and including 3.9.2 allows arbitrary file... A vulnerability in NLTK versions up to and including 3.9.2 allows arbitrary file read via path traversal in multiple CorpusReader classes, including WordListCorpusReader, TaggedCorpusReader, and BracketParseCorpusReader. These classes fail to properly sanitize or validate file paths, enabling attackers to traverse directories and access sensitive files on the server. Thi
debian
CVE-2026-33230MEDIUMCVSS 6.12026
CVE-2026-33230 [MEDIUM] CVE-2026-33230: nltk - NLTK (Natural Language Toolkit) is a suite of open source Python modules, data s... NLTK (Natural Language Toolkit) is a suite of open source Python modules, data sets, and tutorials supporting research and development in Natural Language Processing. In versions 3.9.3 and prior, `nltk.app.wordnet_app` contains a reflected cross-site scripting issue in the `lookup_...` route. A crafted `lookup_` URL can inject arbitrary HTML/JavaScript into the respo
debian
CVE-2025-14009CRITICALCVSS 10.0fixed in nltk 3.9.3-1 (forky)2025
CVE-2025-14009 [CRITICAL] CVE-2025-14009: nltk - A critical vulnerability exists in the NLTK downloader component of nltk/nltk, a... A critical vulnerability exists in the NLTK downloader component of nltk/nltk, affecting all versions. The _unzip_iter function in nltk/downloader.py uses zipfile.extractall() without performing path validation or security checks. This allows attackers to craft malicious zip packages that, when downloaded and extracted by NLTK, can execute arbitrary code. The vulne
debian
CVE-2024-39705CRITICALCVSS 9.8fixed in nltk 3.9.1-1 (forky)2024
CVE-2024-39705 [CRITICAL] CVE-2024-39705: nltk - NLTK through 3.8.1 allows remote code execution if untrusted packages have pickl... NLTK through 3.8.1 allows remote code execution if untrusted packages have pickled Python code, and the integrated data package download functionality is used. This affects, for example, averaged_perceptron_tagger and punkt. Scope: local bookworm: open bullseye: open forky: resolved (fixed in 3.9.1-1) sid: resolved (fixed in 3.9.1-1) trixie: resolved (fixed in 3.9.
debian
CVE-2021-3828HIGHCVSS 7.5fixed in nltk 3.6.5-1 (bookworm)2021
CVE-2021-3828 [HIGH] CVE-2021-3828: nltk - nltk is vulnerable to Inefficient Regular Expression Complexity nltk is vulnerable to Inefficient Regular Expression Complexity Scope: local bookworm: resolved (fixed in 3.6.5-1) bullseye: open forky: resolved (fixed in 3.6.5-1) sid: resolved (fixed in 3.6.5-1) trixie: resolved (fixed in 3.6.5-1)
debian
CVE-2021-43854HIGHCVSS 7.5fixed in nltk 3.6.7-1 (bookworm)2021
CVE-2021-43854 [HIGH] CVE-2021-43854: nltk - NLTK (Natural Language Toolkit) is a suite of open source Python modules, data s... NLTK (Natural Language Toolkit) is a suite of open source Python modules, data sets, and tutorials supporting research and development in Natural Language Processing. Versions prior to 3.6.5 are vulnerable to regular expression denial of service (ReDoS) attacks. The vulnerability is present in PunktSentenceTokenizer, sent_tokenize and word_tokenize. Any users of this c
debian
CVE-2021-3842HIGHCVSS 7.5fixed in nltk 3.6.7-1 (bookworm)2021
CVE-2021-3842 [HIGH] CVE-2021-3842: nltk - nltk is vulnerable to Inefficient Regular Expression Complexity nltk is vulnerable to Inefficient Regular Expression Complexity Scope: local bookworm: resolved (fixed in 3.6.7-1) bullseye: open forky: resolved (fixed in 3.6.7-1) sid: resolved (fixed in 3.6.7-1) trixie: resolved (fixed in 3.6.7-1)
debian
CVE-2019-14751LOWCVSS 7.5fixed in nltk 3.4.5-1 (bookworm)2019
CVE-2019-14751 [HIGH] CVE-2019-14751: nltk - NLTK Downloader before 3.4.5 is vulnerable to a directory traversal, allowing at... NLTK Downloader before 3.4.5 is vulnerable to a directory traversal, allowing attackers to write arbitrary files via a ../ (dot dot slash) in an NLTK package (ZIP archive) that is mishandled during extraction. Scope: local bookworm: resolved (fixed in 3.4.5-1) bullseye: resolved (fixed in 3.4.5-1) forky: resolved (fixed in 3.4.5-1) sid: resolved (fixed in 3.4.5-1) trix
debian