In YARA 3.8.1, bytecode in a specially crafted compiled rule is exposed to information about its environment, in libyara/exec.c. This is a consequence of the design of the YARA virtual machine.
{
"extracted_events": [
{
"introduced": "0"
},
{
"last_affected": "3.8.1"
}
],
"cpe": "cpe:2.3:a:virustotal:yara:3.8.1:*:*:*:*:*:*:*",
"source": "CPE_FIELD"
}