SnakeYAML Project SnakeYAML 1.6

CPE Details

SnakeYAML Project SnakeYAML 1.6
1.6
2020-03-16
15h17 +00:00
2022-09-07
10h25 +00:00
Alerte pour un CPE
Restez informé de toutes modifications pour un CPE spécifique.
Gestion des notifications

CPE Name: cpe:2.3:a:snakeyaml_project:snakeyaml:1.6:*:*:*:*:*:*:*

Informations

Vendor

snakeyaml_project

Product

snakeyaml

Version

1.6

Related CVE

Open and find in CVE List

CVE ID Publié Description Score Gravité
CVE-2022-1471 2022-12-01 10h47 +00:00 SnakeYaml's Constructor() class does not restrict types which can be instantiated during deserialization. Deserializing yaml content provided by an attacker can lead to remote code execution. We recommend using SnakeYaml's SafeConsturctor when parsing untrusted content to restrict deserialization. We recommend upgrading to version 2.0 and beyond.
9.8
Critique
CVE-2022-41854 2022-11-11 13h10 +00:00 Those using Snakeyaml to parse untrusted YAML files may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stack overflow. This effect may support a denial of service attack.
6.5
Moyen
CVE-2022-38749 2022-09-04 22h00 +00:00 Using snakeYAML to parse untrusted YAML files may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stackoverflow.
6.5
Moyen
CVE-2022-38750 2022-09-04 22h00 +00:00 Using snakeYAML to parse untrusted YAML files may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stackoverflow.
6.5
Moyen
CVE-2022-38751 2022-09-04 22h00 +00:00 Using snakeYAML to parse untrusted YAML files may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stackoverflow.
6.5
Moyen
CVE-2022-38752 2022-09-04 22h00 +00:00 Using snakeYAML to parse untrusted YAML files may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stack-overflow.
6.5
Moyen
CVE-2022-25857 2022-08-30 05h05 +00:00 The package org.yaml:snakeyaml from 0 and before 1.31 are vulnerable to Denial of Service (DoS) due missing to nested depth limitation for collections.
7.5
Haute
CVE-2017-18640 2019-12-11 23h00 +00:00 The Alias feature in SnakeYAML before 1.26 allows entity expansion during a load operation, a related issue to CVE-2003-1564.
7.5
Haute