It was discovered that Yelp incorrectly handled paths in ghelp URLs. A remote attacker could use this issue to trick users into opening malicious downloaded help files and exfiltrate sensitive information.
{ "binaries": [ { "binary_version": "42.2-1ubuntu0.24.04.1", "binary_name": "libyelp-dev" }, { "binary_version": "42.2-1ubuntu0.24.04.1", "binary_name": "libyelp0" }, { "binary_version": "42.2-1ubuntu0.24.04.1", "binary_name": "yelp" } ], "availability": "No subscription required" }