SnakeYAML Project SnakeYAML 1.21

CPE Details

SnakeYAML Project SnakeYAML 1.21
1.21
2020-03-16
15h17 +00:00
2020-03-16
15h17 +00:00
Alerte pour un CPE
Stay informed of any changes for a specific CPE.
Notifications manage

CPE Name: cpe:2.3:a:snakeyaml_project:snakeyaml:1.21:*:*:*:*:*:*:*

Informations

Vendor

snakeyaml_project

Product

snakeyaml

Version

1.21

Related CVE

Open and find in CVE List

CVE ID Published Description Score Severity
CVE-2022-1471 2022-12-01 10h47 +00:00 SnakeYaml's Constructor() class does not restrict types which can be instantiated during deserialization. Deserializing yaml content provided by an attacker can lead to remote code execution. We recommend using SnakeYaml's SafeConsturctor when parsing untrusted content to restrict deserialization. We recommend upgrading to version 2.0 and beyond.
9.8
Critical
CVE-2022-41854 2022-11-11 13h10 +00:00 Those using Snakeyaml to parse untrusted YAML files may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stack overflow. This effect may support a denial of service attack.
6.5
Medium
CVE-2022-38751 2022-09-05 00h00 +00:00 Using snakeYAML to parse untrusted YAML files may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stackoverflow.
6.5
Medium
CVE-2022-38749 2022-09-04 22h00 +00:00 Using snakeYAML to parse untrusted YAML files may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stackoverflow.
6.5
Medium
CVE-2022-38750 2022-09-04 22h00 +00:00 Using snakeYAML to parse untrusted YAML files may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stackoverflow.
6.5
Medium
CVE-2022-38752 2022-09-04 22h00 +00:00 Using snakeYAML to parse untrusted YAML files may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stack-overflow.
6.5
Medium
CVE-2022-25857 2022-08-30 05h05 +00:00 The package org.yaml:snakeyaml from 0 and before 1.31 are vulnerable to Denial of Service (DoS) due missing to nested depth limitation for collections.
7.5
High
CVE-2017-18640 2019-12-11 23h00 +00:00 The Alias feature in SnakeYAML before 1.26 allows entity expansion during a load operation, a related issue to CVE-2003-1564.
7.5
High