Количество 9
Количество 9
CVE-2014-2525
Heap-based buffer overflow in the yaml_parser_scan_uri_escapes function in LibYAML before 0.1.6 allows context-dependent attackers to execute arbitrary code via a long sequence of percent-encoded characters in a URI in a YAML file.
CVE-2014-2525
Heap-based buffer overflow in the yaml_parser_scan_uri_escapes function in LibYAML before 0.1.6 allows context-dependent attackers to execute arbitrary code via a long sequence of percent-encoded characters in a URI in a YAML file.
CVE-2014-2525
Heap-based buffer overflow in the yaml_parser_scan_uri_escapes function in LibYAML before 0.1.6 allows context-dependent attackers to execute arbitrary code via a long sequence of percent-encoded characters in a URI in a YAML file.
CVE-2014-2525
Heap-based buffer overflow in the yaml_parser_scan_uri_escapes functio ...
GHSA-rffm-7xqq-h2v6
Heap-based buffer overflow in the yaml_parser_scan_uri_escapes function in LibYAML before 0.1.6 allows context-dependent attackers to execute arbitrary code via a long sequence of percent-encoded characters in a URI in a YAML file.
BDU:2015-09768
Уязвимость операционной системы Gentoo Linux, позволяющая удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
openSUSE-SU-2016:1067-1
Security update for perl-YAML-LibYAML
SUSE-SU-2015:0953-2
Security update for perl-YAML-LibYAML
SUSE-SU-2015:0953-1
Security update for perl-YAML-LibYAML
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2014-2525 Heap-based buffer overflow in the yaml_parser_scan_uri_escapes function in LibYAML before 0.1.6 allows context-dependent attackers to execute arbitrary code via a long sequence of percent-encoded characters in a URI in a YAML file. | CVSS2: 6.8 | 63% Средний | почти 12 лет назад | |
CVE-2014-2525 Heap-based buffer overflow in the yaml_parser_scan_uri_escapes function in LibYAML before 0.1.6 allows context-dependent attackers to execute arbitrary code via a long sequence of percent-encoded characters in a URI in a YAML file. | CVSS2: 6.8 | 63% Средний | почти 12 лет назад | |
CVE-2014-2525 Heap-based buffer overflow in the yaml_parser_scan_uri_escapes function in LibYAML before 0.1.6 allows context-dependent attackers to execute arbitrary code via a long sequence of percent-encoded characters in a URI in a YAML file. | CVSS2: 6.8 | 63% Средний | почти 12 лет назад | |
CVE-2014-2525 Heap-based buffer overflow in the yaml_parser_scan_uri_escapes functio ... | CVSS2: 6.8 | 63% Средний | почти 12 лет назад | |
GHSA-rffm-7xqq-h2v6 Heap-based buffer overflow in the yaml_parser_scan_uri_escapes function in LibYAML before 0.1.6 allows context-dependent attackers to execute arbitrary code via a long sequence of percent-encoded characters in a URI in a YAML file. | 63% Средний | больше 3 лет назад | ||
BDU:2015-09768 Уязвимость операционной системы Gentoo Linux, позволяющая удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации | CVSS2: 6.8 | 63% Средний | больше 11 лет назад | |
openSUSE-SU-2016:1067-1 Security update for perl-YAML-LibYAML | почти 10 лет назад | |||
SUSE-SU-2015:0953-2 Security update for perl-YAML-LibYAML | почти 11 лет назад | |||
SUSE-SU-2015:0953-1 Security update for perl-YAML-LibYAML | почти 11 лет назад |
Уязвимостей на страницу