Show filters
38 Total Results
Displaying 31-38 of 38
Sort by:
Attacker Value
Unknown
CVE-2017-18342
Disclosure Date: June 27, 2018 (last updated November 08, 2023)
In PyYAML before 5.1, the yaml.load() API could execute arbitrary code if used with untrusted data. The load() function has been deprecated in version 5.1 and the 'UnsafeLoader' has been introduced for backward compatibility with the function.
0
Attacker Value
Unknown
CVE-2017-11692
Disclosure Date: July 30, 2017 (last updated November 26, 2024)
The function "Token& Scanner::peek" in scanner.cpp in yaml-cpp 0.5.3 and earlier allows remote attackers to cause a denial of service (assertion failure and application exit) via a '!2' string.
0
Attacker Value
Unknown
CVE-2017-5950
Disclosure Date: April 03, 2017 (last updated November 26, 2024)
The SingleDocParser::HandleNode function in yaml-cpp (aka LibYaml-C++) 0.5.3 allows remote attackers to cause a denial of service (stack consumption and application crash) via a crafted YAML file.
0
Attacker Value
Unknown
CVE-2014-9130
Disclosure Date: December 08, 2014 (last updated October 05, 2023)
scanner.c in LibYAML 0.1.5 and 0.1.6, as used in the YAML-LibYAML (aka YAML-XS) module for Perl, allows context-dependent attackers to cause a denial of service (assertion failure and crash) via vectors involving line-wrapping.
0
Attacker Value
Unknown
CVE-2014-2525
Disclosure Date: March 28, 2014 (last updated October 05, 2023)
Heap-based buffer overflow in the yaml_parser_scan_uri_escapes function in LibYAML before 0.1.6 allows context-dependent attackers to execute arbitrary code via a long sequence of percent-encoded characters in a URI in a YAML file.
0
Attacker Value
Unknown
CVE-2013-6393
Disclosure Date: February 06, 2014 (last updated October 05, 2023)
The yaml_parser_scan_tag_uri function in scanner.c in LibYAML before 0.1.5 performs an incorrect cast, which allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via crafted tags in a YAML document, which triggers a heap-based buffer overflow.
0
Attacker Value
Unknown
CVE-2013-4660
Disclosure Date: June 28, 2013 (last updated October 05, 2023)
The JS-YAML module before 2.0.5 for Node.js parses input without properly considering the unsafe !!js/function tag, which allows remote attackers to execute arbitrary code via a crafted string that triggers an eval operation.
0
Attacker Value
Unknown
CVE-2012-1152
Disclosure Date: September 09, 2012 (last updated October 05, 2023)
Multiple format string vulnerabilities in the error reporting functionality in the YAML::LibYAML (aka YAML-LibYAML and perl-YAML-LibYAML) module 0.38 for Perl allow remote attackers to cause a denial of service (process crash) via format string specifiers in a (1) YAML stream to the Load function, (2) YAML node to the load_node function, (3) YAML mapping to the load_mapping function, or (4) YAML sequence to the load_sequence function.
0