Search Results (Refine Search)
- Results Type: Overview
- Keyword (text search): cpe:2.3:a:pyyaml:libyaml:0.1.5:*:*:*:*:*:*:*
- CPE Name Search: true
Vuln ID | Summary | CVSS Severity |
---|---|---|
CVE-2014-9130 |
scanner.c in LibYAML 0.1.5 and 0.1.6, as used in the YAML-LibYAML (aka YAML-XS) module for Perl, allows context-dependent attackers to cause a denial of service (assertion failure and crash) via vectors involving line-wrapping. Published: December 08, 2014; 11:59:04 AM -0500 |
V3.x:(not available) V2.0: 5.0 MEDIUM |
CVE-2014-2525 |
Heap-based buffer overflow in the yaml_parser_scan_uri_escapes function in LibYAML before 0.1.6 allows context-dependent attackers to execute arbitrary code via a long sequence of percent-encoded characters in a URI in a YAML file. Published: March 28, 2014; 11:55:08 AM -0400 |
V3.x:(not available) V2.0: 6.8 MEDIUM |