Total vulnerabilities in the database
Heap-based buffer overflow in the yaml_parser_scan_uri_escapes function in LibYAML before 0.1.6 allows context-dependent attackers to execute arbitrary code via a long sequence of percent-encoded characters in a URI in a YAML file.
Software | From | Fixed in |
---|---|---|
pyyaml / libyaml | 0.1.4 | 0.1.4.x |
pyyaml / libyaml | - | 0.1.5.x |
pyyaml / libyaml | 0.1.2 | 0.1.2.x |
pyyaml / libyaml | 0.1.3 | 0.1.3.x |
pyyaml / libyaml | 0.1.1 | 0.1.1.x |
pyyaml / libyaml | 0.0.1 | 0.0.1.x |
opensuse / leap | 42.1 | 42.1.x |
opensuse / opensuse | 13.1 | 13.1.x |
opensuse / opensuse | 13.2 | 13.2.x |