The LibYAML project in C is affected by a heap-based buffer overflow due to input sanitization errors, allowing arbitrary code execution via specially crafted YAML files
Source | Link |
---|---|
cve | www.cve.mitre.org/cgi-bin/cvename.cgi |
OS | OS Version | Architecture | Package | Package Version | Filename |
---|---|---|---|---|---|
FreeBSD | any | noarch | libyaml | 0.1.6 | UNKNOWN |
FreeBSD | any | noarch | mingw32-libyaml | 0.1.6 | UNKNOWN |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. ContactΒ us for a demo andΒ discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo