<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cve-2016-20038 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2016-20038/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Sat, 28 Mar 2026 12:15:59 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2016-20038/feed.xml" rel="self" type="application/rss+xml"/><item><title>yTree Stack-Based Buffer Overflow Vulnerability (CVE-2016-20038)</title><link>https://feed.craftedsignal.io/briefs/2026-03-ytree-buffer-overflow/</link><pubDate>Sat, 28 Mar 2026 12:15:59 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-ytree-buffer-overflow/</guid><description>yTree version 1.94-1.1 is vulnerable to a stack-based buffer overflow, allowing local attackers to execute arbitrary code by supplying an excessively long argument to overwrite the stack with shellcode.</description><content:encoded>&lt;p>yTree versions 1.94 to 1.1 are susceptible to a stack-based buffer overflow vulnerability (CVE-2016-20038). A local attacker can exploit this flaw by providing an overly long command-line argument to the application. The vulnerability allows the attacker to overwrite the stack memory, inject and execute arbitrary code within the context of the yTree application. This could lead to a full system compromise if the attacker gains sufficient privileges. This vulnerability has been publicly known…&lt;/p>
</content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve-2016-20038</category><category>buffer-overflow</category><category>local-code-execution</category></item></channel></rss>