Show filters
38 Total Results
Displaying 11-20 of 38
Sort by:
Attacker Value
Unknown
CVE-2022-38751
Disclosure Date: September 05, 2022 (last updated October 08, 2023)
Using snakeYAML to parse untrusted YAML files may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stackoverflow.
0
Attacker Value
Unknown
CVE-2022-38750
Disclosure Date: September 05, 2022 (last updated October 08, 2023)
Using snakeYAML to parse untrusted YAML files may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stackoverflow.
0
Attacker Value
Unknown
CVE-2022-38749
Disclosure Date: September 05, 2022 (last updated October 08, 2023)
Using snakeYAML to parse untrusted YAML files may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stackoverflow.
0
Attacker Value
Unknown
CVE-2022-25857
Disclosure Date: August 30, 2022 (last updated October 08, 2023)
The package org.yaml:snakeyaml from 0 and before 1.31 are vulnerable to Denial of Service (DoS) due missing to nested depth limitation for collections.
0
Attacker Value
Unknown
CVE-2022-28948
Disclosure Date: May 19, 2022 (last updated November 29, 2024)
An issue in the Unmarshal function in Go-Yaml v3 causes the program to crash when attempting to deserialize invalid input.
0
Attacker Value
Unknown
CVE-2020-2179
Disclosure Date: April 16, 2020 (last updated February 21, 2025)
Jenkins Yaml Axis Plugin 0.2.0 and earlier does not configure its YAML parser to prevent the instantiation of arbitrary types, resulting in a remote code execution vulnerability.
0
Attacker Value
Unknown
CVE-2020-1747
Disclosure Date: March 24, 2020 (last updated February 21, 2025)
A vulnerability was discovered in the PyYAML library in versions before 5.3.1, where it is susceptible to arbitrary code execution when it processes untrusted YAML files through the full_load method or with the FullLoader loader. Applications that use the library to process untrusted input may be vulnerable to this flaw. An attacker could use this flaw to execute arbitrary code on the system by abusing the python/object/new constructor.
0
Attacker Value
Unknown
CVE-2020-8441
Disclosure Date: February 19, 2020 (last updated February 21, 2025)
JYaml through 1.3 allows remote code execution during deserialization of a malicious payload through the load() function. NOTE: this is a discontinued product.
0
Attacker Value
Unknown
CVE-2019-20478
Disclosure Date: February 19, 2020 (last updated November 27, 2024)
In ruamel.yaml through 0.16.7, the load method allows remote code execution if the application calls this method with an untrusted argument. In other words, this issue affects developers who are unaware of the need to use methods such as safe_load in these use cases.
0
Attacker Value
Unknown
CVE-2019-20477
Disclosure Date: February 19, 2020 (last updated February 21, 2025)
PyYAML 5.1 through 5.1.2 has insufficient restrictions on the load and load_all functions because of a class deserialization issue, e.g., Popen is a class in the subprocess module. NOTE: this issue exists because of an incomplete fix for CVE-2017-18342.
0