A vulnerability in PyYAML library before version 5.3.1 allows arbitrary code execution via untrusted YAML file
Reporter | Title | Published | Views | Family All 139 |
---|---|---|---|---|
Veracode | Remote Code Execution | 3 Mar 202003:39 | – | veracode |
Veracode | Arbitrary Code Execution | 27 Oct 202005:37 | – | veracode |
OpenVAS | Fedora: Security Advisory for PyYAML (FEDORA-2020-e9741a6a15) | 29 Mar 202000:00 | – | openvas |
OpenVAS | Huawei EulerOS: Security Advisory for PyYaml (EulerOS-SA-2020-1825) | 31 Jul 202000:00 | – | openvas |
OpenVAS | Huawei EulerOS: Security Advisory for PyYAML (EulerOS-SA-2020-1912) | 31 Aug 202000:00 | – | openvas |
OpenVAS | openSUSE: Security Advisory for python-PyYAML (openSUSE-SU-2020:0630-1) | 12 May 202000:00 | – | openvas |
OpenVAS | SUSE: Security Advisory (SUSE-SU-2020:0959-1) | 9 Jun 202100:00 | – | openvas |
OpenVAS | openSUSE: Security Advisory for python-PyYAML (openSUSE-SU-2020:0507-1) | 12 Apr 202000:00 | – | openvas |
OpenVAS | Fedora: Security Advisory for PyYAML (FEDORA-2020-bdb0bfa928) | 29 Mar 202000:00 | – | openvas |
OpenVAS | Mageia: Security Advisory (MGASA-2020-0155) | 28 Jan 202200:00 | – | openvas |
OS | OS Version | Architecture | Package | Package Version | Filename |
---|---|---|---|---|---|
Alpine | edge-main | noarch | py3-yaml | 5.3.1-r0 | UNKNOWN |
Alpine | 3.11-main | noarch | py3-yaml | 5.3.1-r0 | UNKNOWN |
Alpine | 3.12-main | noarch | py3-yaml | 5.3.1-r0 | UNKNOWN |
Alpine | 3.13-main | noarch | py3-yaml | 5.3.1-r0 | UNKNOWN |
Alpine | 3.14-main | noarch | py3-yaml | 5.3.1-r0 | UNKNOWN |
Alpine | 3.15-main | noarch | py3-yaml | 5.3.1-r0 | UNKNOWN |
Alpine | 3.16-main | noarch | py3-yaml | 5.3.1-r0 | UNKNOWN |
Alpine | 3.17-main | noarch | py3-yaml | 5.3.1-r0 | UNKNOWN |
Alpine | 3.18-main | noarch | py3-yaml | 5.3.1-r0 | UNKNOWN |
Alpine | 3.19-main | noarch | py3-yaml | 5.3.1-r0 | UNKNOWN |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo