Show filters
25 Total Results
Displaying 11-20 of 25
Sort by:
Attacker Value
Unknown
CVE-2022-28948
Disclosure Date: May 19, 2022 (last updated November 29, 2024)
An issue in the Unmarshal function in Go-Yaml v3 causes the program to crash when attempting to deserialize invalid input.
0
Attacker Value
Unknown
CVE-2020-8441
Disclosure Date: February 19, 2020 (last updated February 21, 2025)
JYaml through 1.3 allows remote code execution during deserialization of a malicious payload through the load() function. NOTE: this is a discontinued product.
0
Attacker Value
Unknown
CVE-2019-20478
Disclosure Date: February 19, 2020 (last updated November 27, 2024)
In ruamel.yaml through 0.16.7, the load method allows remote code execution if the application calls this method with an untrusted argument. In other words, this issue affects developers who are unaware of the need to use methods such as safe_load in these use cases.
0
Attacker Value
Unknown
CVE-2017-18640
Disclosure Date: December 12, 2019 (last updated November 08, 2023)
The Alias feature in SnakeYAML before 1.26 allows entity expansion during a load operation, a related issue to CVE-2003-1564.
0
Attacker Value
Unknown
CVE-2018-20993
Disclosure Date: August 26, 2019 (last updated November 27, 2024)
An issue was discovered in the yaml-rust crate before 0.4.1 for Rust. There is uncontrolled recursion during deserialization.
0
Attacker Value
Unknown
CVE-2019-1010182
Disclosure Date: July 25, 2019 (last updated November 27, 2024)
yaml-rust 0.4.0 and earlier is affected by: Uncontrolled Recursion. The impact is: Denial of service by impossible to catch abort. The component is: YamlLoader::load_from_str function. The attack vector is: Parsing of a malicious YAML document. The fixed version is: 0.4.1 and later.
0
Attacker Value
Unknown
CVE-2019-1010183
Disclosure Date: July 25, 2019 (last updated November 27, 2024)
serde serde_yaml 0.6.0 to 0.8.3 is affected by: Uncontrolled Recursion. The impact is: Denial of service by aborting. The component is: from_* functions (all deserialization functions). The attack vector is: Parsing a malicious YAML file. The fixed version is: 0.8.4 and later.
0
Attacker Value
Unknown
CVE-2019-6292
Disclosure Date: January 15, 2019 (last updated November 27, 2024)
An issue was discovered in singledocparser.cpp in yaml-cpp (aka LibYaml-C++) 0.6.2. Stack Exhaustion occurs in YAML::SingleDocParser, and there is a stack consumption problem caused by recursive stack frames: HandleCompactMap, HandleMap, HandleFlowSequence, HandleSequence, HandleNode. Remote attackers could leverage this vulnerability to cause a denial-of-service via a cpp file.
0
Attacker Value
Unknown
CVE-2019-6285
Disclosure Date: January 14, 2019 (last updated November 27, 2024)
The SingleDocParser::HandleFlowSequence function in yaml-cpp (aka LibYaml-C++) 0.6.2 allows remote attackers to cause a denial of service (stack consumption and application crash) via a crafted YAML file.
0
Attacker Value
Unknown
CVE-2019-3575
Disclosure Date: January 03, 2019 (last updated November 27, 2024)
Sqla_yaml_fixtures 0.9.1 allows local users to execute arbitrary python code via the fixture_text argument in sqla_yaml_fixtures.load.
0