[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248392

 
 

909

 
 

195452

 
 

282

Paid content will be excluded from the download.


Download | Alert*


CVE-2013-6393
The yaml_parser_scan_tag_uri function in scanner.c in LibYAML before 0.1.5 performs an incorrect cast, which allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via crafted tags in a YAML document, which triggers a heap-based buffer overflow.

CVE-2014-2525
Heap-based buffer overflow in the yaml_parser_scan_uri_escapes function in LibYAML before 0.1.6 allows context-dependent attackers to execute arbitrary code via a long sequence of percent-encoded characters in a URI in a YAML file.

*OVAL
oval:org.secpod.oval:def:701623
CPE    4
cpe:/o:ubuntu:ubuntu_linux:12.10
cpe:/o:ubuntu:ubuntu_linux:13.10
cpe:/o:ubuntu:ubuntu_linux:12.04
cpe:/a:pyyaml:libyaml-libyaml-perl
...

© SecPod Technologies