Lucene search

K
Snakeyaml ProjectSnakeyaml

7 matches found

CVE
CVE
added 2022/12/01 11:15 a.m.728 views

CVE-2022-1471

SnakeYaml's Constructor() class does not restrict types which can be instantiated during deserialization. Deserializing yaml content provided by an attacker can lead to remote code execution. We recommend using SnakeYaml's SafeConsturctor when parsing untrusted content to restrict deserialization. ...

9.8CVSS9.2AI score0.93849EPSS
CVE
CVE
added 2022/08/30 5:15 a.m.543 views

CVE-2022-25857

The package org.yaml:snakeyaml from 0 and before 1.31 are vulnerable to Denial of Service (DoS) due missing to nested depth limitation for collections.

7.5CVSS8.8AI score0.00299EPSS
CVE
CVE
added 2022/09/05 10:15 a.m.491 views

CVE-2022-38749

Using snakeYAML to parse untrusted YAML files may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stackoverflow.

6.5CVSS7.7AI score0.0058EPSS
CVE
CVE
added 2022/09/05 10:15 a.m.487 views

CVE-2022-38750

Using snakeYAML to parse untrusted YAML files may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stackoverflow.

6.5CVSS6.4AI score0.00086EPSS
CVE
CVE
added 2022/11/11 1:15 p.m.482 views

CVE-2022-41854

Those using Snakeyaml to parse untrusted YAML files may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stack overflow. This effect may support a denial of service attack.

6.5CVSS6.3AI score0.00076EPSS
CVE
CVE
added 2022/09/05 10:15 a.m.471 views

CVE-2022-38751

Using snakeYAML to parse untrusted YAML files may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stackoverflow.

6.5CVSS7.4AI score0.00173EPSS
CVE
CVE
added 2022/09/05 10:15 a.m.456 views

CVE-2022-38752

Using snakeYAML to parse untrusted YAML files may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stack-overflow.

6.5CVSS6.9AI score0.00209EPSS