Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.
CVSS
No CVSS.
References
No reference.
Configurations
No configuration.
History
28 Aug 2024, 16:15
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : unknown |
CWE | ||
Summary |
|
|
Summary | (en) Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none. | |
CPE | ||
References |
|
28 Aug 2024, 15:15
Type | Values Removed | Values Added |
---|---|---|
Summary | (en) libyaml v0.2.5 is vulnerable to Buffer Overflow. Affected by this issue is the function yaml_emitter_emit of the file /src/libyaml/src/emitter.c. The manipulation leads to a double-free. NOTE: this is disputed by the supplier because the discoverer's sample C code is incorrect: it does not call all of the required _initialize functions that are described in the LibYAML documentation. | |
References |
|
06 Aug 2024, 17:11
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:pyyaml:libyaml:0.2.5:*:*:*:*:*:*:* | |
Summary |
|
|
CWE | CWE-787 | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
First Time |
Pyyaml
Pyyaml libyaml |
|
References | () https://github.com/idhyt/pocs/blob/main/libyaml/CVE-2024-35326.c - Exploit, Third Party Advisory |
13 Jun 2024, 17:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-06-13 17:15
Updated : 2024-08-28 16:15
NVD link : CVE-2024-35326
Mitre link : CVE-2024-35326
CVE.ORG link : CVE-2024-35326
JSON object : View
Products Affected
No product.
CWE
No CWE.