Show filters
25 Total Results
Displaying 21-25 of 25
Sort by:
Attacker Value
Unknown
CVE-2018-20574
Disclosure Date: December 28, 2018 (last updated November 27, 2024)
The SingleDocParser::HandleFlowMap function in yaml-cpp (aka LibYaml-C++) 0.6.2 allows remote attackers to cause a denial of service (stack consumption and application crash) via a crafted YAML file.
0
Attacker Value
Unknown
CVE-2018-20573
Disclosure Date: December 28, 2018 (last updated November 27, 2024)
The Scanner::EnsureTokensInQueue function in yaml-cpp (aka LibYaml-C++) 0.6.2 allows remote attackers to cause a denial of service (stack consumption and application crash) via a crafted YAML file.
0
Attacker Value
Unknown
CVE-2017-11692
Disclosure Date: July 30, 2017 (last updated November 26, 2024)
The function "Token& Scanner::peek" in scanner.cpp in yaml-cpp 0.5.3 and earlier allows remote attackers to cause a denial of service (assertion failure and application exit) via a '!2' string.
0
Attacker Value
Unknown
CVE-2017-5950
Disclosure Date: April 03, 2017 (last updated November 26, 2024)
The SingleDocParser::HandleNode function in yaml-cpp (aka LibYaml-C++) 0.5.3 allows remote attackers to cause a denial of service (stack consumption and application crash) via a crafted YAML file.
0
Attacker Value
Unknown
CVE-2013-4660
Disclosure Date: June 28, 2013 (last updated October 05, 2023)
The JS-YAML module before 2.0.5 for Node.js parses input without properly considering the unsafe !!js/function tag, which allows remote attackers to execute arbitrary code via a crafted string that triggers an eval operation.
0