Show filters
38 Total Results
Displaying 11-20 of 38
Sort by:
Attacker Value
Unknown

CVE-2022-38751

Disclosure Date: September 05, 2022 (last updated October 08, 2023)
Using snakeYAML to parse untrusted YAML files may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stackoverflow.
Attacker Value
Unknown

CVE-2022-38750

Disclosure Date: September 05, 2022 (last updated October 08, 2023)
Using snakeYAML to parse untrusted YAML files may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stackoverflow.
Attacker Value
Unknown

CVE-2022-38749

Disclosure Date: September 05, 2022 (last updated October 08, 2023)
Using snakeYAML to parse untrusted YAML files may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stackoverflow.
Attacker Value
Unknown

CVE-2022-25857

Disclosure Date: August 30, 2022 (last updated October 08, 2023)
The package org.yaml:snakeyaml from 0 and before 1.31 are vulnerable to Denial of Service (DoS) due missing to nested depth limitation for collections.
Attacker Value
Unknown

CVE-2022-28948

Disclosure Date: May 19, 2022 (last updated November 29, 2024)
An issue in the Unmarshal function in Go-Yaml v3 causes the program to crash when attempting to deserialize invalid input.
Attacker Value
Unknown

CVE-2020-2179

Disclosure Date: April 16, 2020 (last updated February 21, 2025)
Jenkins Yaml Axis Plugin 0.2.0 and earlier does not configure its YAML parser to prevent the instantiation of arbitrary types, resulting in a remote code execution vulnerability.
Attacker Value
Unknown

CVE-2020-1747

Disclosure Date: March 24, 2020 (last updated February 21, 2025)
A vulnerability was discovered in the PyYAML library in versions before 5.3.1, where it is susceptible to arbitrary code execution when it processes untrusted YAML files through the full_load method or with the FullLoader loader. Applications that use the library to process untrusted input may be vulnerable to this flaw. An attacker could use this flaw to execute arbitrary code on the system by abusing the python/object/new constructor.
Attacker Value
Unknown

CVE-2020-8441

Disclosure Date: February 19, 2020 (last updated February 21, 2025)
JYaml through 1.3 allows remote code execution during deserialization of a malicious payload through the load() function. NOTE: this is a discontinued product.
Attacker Value
Unknown

CVE-2019-20478

Disclosure Date: February 19, 2020 (last updated November 27, 2024)
In ruamel.yaml through 0.16.7, the load method allows remote code execution if the application calls this method with an untrusted argument. In other words, this issue affects developers who are unaware of the need to use methods such as safe_load in these use cases.
Attacker Value
Unknown

CVE-2019-20477

Disclosure Date: February 19, 2020 (last updated February 21, 2025)
PyYAML 5.1 through 5.1.2 has insufficient restrictions on the load and load_all functions because of a class deserialization issue, e.g., Popen is a class in the subprocess module. NOTE: this issue exists because of an incomplete fix for CVE-2017-18342.