Lucene search

K
Snakeyaml ProjectSnakeyaml

5 matches found

CVE
CVE
added 2022/09/05 10:15 a.m.546 views

CVE-2022-38749

Using snakeYAML to parse untrusted YAML files may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stackoverflow.

6.5CVSS7.7AI score0.00456EPSS
CVE
CVE
added 2022/09/05 10:15 a.m.541 views

CVE-2022-38750

Using snakeYAML to parse untrusted YAML files may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stackoverflow.

6.5CVSS6.4AI score0.00066EPSS
CVE
CVE
added 2022/11/11 1:15 p.m.536 views

CVE-2022-41854

Those using Snakeyaml to parse untrusted YAML files may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stack overflow. This effect may support a denial of service attack.

6.5CVSS6.3AI score0.00095EPSS
CVE
CVE
added 2022/09/05 10:15 a.m.527 views

CVE-2022-38751

Using snakeYAML to parse untrusted YAML files may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stackoverflow.

6.5CVSS7.4AI score0.00133EPSS
CVE
CVE
added 2022/09/05 10:15 a.m.511 views

CVE-2022-38752

Using snakeYAML to parse untrusted YAML files may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stack-overflow.

6.5CVSS6.9AI score0.0014EPSS