Show filters
8 Total Results
Displaying 1-8 of 8
Sort by:
Attacker Value
Low
CVE-2022-1471
Disclosure Date: December 01, 2022 (last updated February 14, 2025)
SnakeYaml's Constructor() class does not restrict types which can be instantiated during deserialization. Deserializing yaml content provided by an attacker can lead to remote code execution. We recommend using SnakeYaml's SafeConsturctor when parsing untrusted content to restrict deserialization. We recommend upgrading to version 2.0 and beyond.
3
Attacker Value
Unknown
CVE-2022-41854
Disclosure Date: September 11, 2022 (last updated November 08, 2023)
Those using Snakeyaml to parse untrusted YAML files may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stack overflow. This effect may support a denial of service attack.
0
Attacker Value
Unknown
CVE-2022-38752
Disclosure Date: September 05, 2022 (last updated October 08, 2023)
Using snakeYAML to parse untrusted YAML files may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stack-overflow.
0
Attacker Value
Unknown
CVE-2022-38751
Disclosure Date: September 05, 2022 (last updated October 08, 2023)
Using snakeYAML to parse untrusted YAML files may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stackoverflow.
0
Attacker Value
Unknown
CVE-2022-38750
Disclosure Date: September 05, 2022 (last updated October 08, 2023)
Using snakeYAML to parse untrusted YAML files may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stackoverflow.
0
Attacker Value
Unknown
CVE-2022-38749
Disclosure Date: September 05, 2022 (last updated October 08, 2023)
Using snakeYAML to parse untrusted YAML files may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stackoverflow.
0
Attacker Value
Unknown
CVE-2022-25857
Disclosure Date: August 30, 2022 (last updated October 08, 2023)
The package org.yaml:snakeyaml from 0 and before 1.31 are vulnerable to Denial of Service (DoS) due missing to nested depth limitation for collections.
0
Attacker Value
Unknown
CVE-2017-18640
Disclosure Date: December 12, 2019 (last updated November 08, 2023)
The Alias feature in SnakeYAML before 1.26 allows entity expansion during a load operation, a related issue to CVE-2003-1564.
0