Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Mon, 30 Mar 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 30 Mar 2026 07:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Werner
Werner ytree |
|
| Vendors & Products |
Werner
Werner ytree |
Sat, 28 Mar 2026 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | yTree 1.94-1.1 contains a stack-based buffer overflow vulnerability that allows local attackers to execute arbitrary code by supplying an excessively long argument to the application. Attackers can craft a malicious command-line argument containing shellcode and a return address to overwrite the stack and execute code in the application context. | |
| Title | yTree 1.94-1.1 Stack-Based Buffer Overflow | |
| Weaknesses | CWE-787 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-03-30T15:50:05.015Z
Reserved: 2026-03-28T11:28:58.958Z
Link: CVE-2016-20038
Updated: 2026-03-30T15:49:58.627Z
Status : Deferred
Published: 2026-03-28T12:15:59.277
Modified: 2026-05-01T15:21:32.393
Link: CVE-2016-20038
No data.
OpenCVE Enrichment
Updated: 2026-03-30T06:59:26Z