Lucene search

K
Snakeyaml ProjectSnakeyaml

5 matches found

CVE
CVE
added 2022/09/05 10:15 a.m.489 views

CVE-2022-38749

Using snakeYAML to parse untrusted YAML files may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stackoverflow.

6.5CVSS7.7AI score0.0058EPSS
CVE
CVE
added 2022/09/05 10:15 a.m.485 views

CVE-2022-38750

Using snakeYAML to parse untrusted YAML files may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stackoverflow.

6.5CVSS6.4AI score0.00086EPSS
CVE
CVE
added 2022/11/11 1:15 p.m.480 views

CVE-2022-41854

Those using Snakeyaml to parse untrusted YAML files may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stack overflow. This effect may support a denial of service attack.

6.5CVSS6.3AI score0.00076EPSS
CVE
CVE
added 2022/09/05 10:15 a.m.469 views

CVE-2022-38751

Using snakeYAML to parse untrusted YAML files may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stackoverflow.

6.5CVSS7.4AI score0.00173EPSS
CVE
CVE
added 2022/09/05 10:15 a.m.454 views

CVE-2022-38752

Using snakeYAML to parse untrusted YAML files may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stack-overflow.

6.5CVSS6.9AI score0.00209EPSS