Show filters
38 Total Results
Displaying 21-30 of 38
Sort by:
Attacker Value
Unknown
CVE-2017-18640
Disclosure Date: December 12, 2019 (last updated November 08, 2023)
The Alias feature in SnakeYAML before 1.26 allows entity expansion during a load operation, a related issue to CVE-2003-1564.
0
Attacker Value
Unknown
CVE-2018-20993
Disclosure Date: August 26, 2019 (last updated November 27, 2024)
An issue was discovered in the yaml-rust crate before 0.4.1 for Rust. There is uncontrolled recursion during deserialization.
0
Attacker Value
Unknown
CVE-2019-1010182
Disclosure Date: July 25, 2019 (last updated November 27, 2024)
yaml-rust 0.4.0 and earlier is affected by: Uncontrolled Recursion. The impact is: Denial of service by impossible to catch abort. The component is: YamlLoader::load_from_str function. The attack vector is: Parsing of a malicious YAML document. The fixed version is: 0.4.1 and later.
0
Attacker Value
Unknown
CVE-2019-1010183
Disclosure Date: July 25, 2019 (last updated November 27, 2024)
serde serde_yaml 0.6.0 to 0.8.3 is affected by: Uncontrolled Recursion. The impact is: Denial of service by aborting. The component is: from_* functions (all deserialization functions). The attack vector is: Parsing a malicious YAML file. The fixed version is: 0.8.4 and later.
0
Attacker Value
Unknown
CVE-2019-6292
Disclosure Date: January 15, 2019 (last updated November 27, 2024)
An issue was discovered in singledocparser.cpp in yaml-cpp (aka LibYaml-C++) 0.6.2. Stack Exhaustion occurs in YAML::SingleDocParser, and there is a stack consumption problem caused by recursive stack frames: HandleCompactMap, HandleMap, HandleFlowSequence, HandleSequence, HandleNode. Remote attackers could leverage this vulnerability to cause a denial-of-service via a cpp file.
0
Attacker Value
Unknown
CVE-2019-6285
Disclosure Date: January 14, 2019 (last updated November 27, 2024)
The SingleDocParser::HandleFlowSequence function in yaml-cpp (aka LibYaml-C++) 0.6.2 allows remote attackers to cause a denial of service (stack consumption and application crash) via a crafted YAML file.
0
Attacker Value
Unknown
CVE-2019-3575
Disclosure Date: January 03, 2019 (last updated November 27, 2024)
Sqla_yaml_fixtures 0.9.1 allows local users to execute arbitrary python code via the fixture_text argument in sqla_yaml_fixtures.load.
0
Attacker Value
Unknown
CVE-2018-20574
Disclosure Date: December 28, 2018 (last updated November 27, 2024)
The SingleDocParser::HandleFlowMap function in yaml-cpp (aka LibYaml-C++) 0.6.2 allows remote attackers to cause a denial of service (stack consumption and application crash) via a crafted YAML file.
0
Attacker Value
Unknown
CVE-2018-20573
Disclosure Date: December 28, 2018 (last updated November 27, 2024)
The Scanner::EnsureTokensInQueue function in yaml-cpp (aka LibYaml-C++) 0.6.2 allows remote attackers to cause a denial of service (stack consumption and application crash) via a crafted YAML file.
0
Attacker Value
Unknown
CVE-2018-1000210
Disclosure Date: July 13, 2018 (last updated November 27, 2024)
YamlDotNet version 4.3.2 and earlier contains a Insecure Direct Object Reference vulnerability in The default behavior of Deserializer.Deserialize() will deserialize user-controlled types in the line "currentType = Type.GetType(nodeEvent.Tag.Substring(1), throwOnError: false);" and blindly instantiates them. that can result in Code execution in the context of the running process. This attack appear to be exploitable via Victim must parse a specially-crafted YAML file. This vulnerability appears to have been fixed in 5.0.0.
0