Snakeyaml Project Snakeyaml vulnerabilities

8 known vulnerabilities affecting snakeyaml_project/snakeyaml.

Total CVEs
8
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
CRITICAL1HIGH2MEDIUM5

Vulnerabilities

Page 1 of 1
CVE-2022-1471CRITICALCVSS 9.8fixed in 2.02022-12-01
CVE-2022-1471 [HIGH] CWE-20 CVE-2022-1471: SnakeYaml's Constructor() class does not restrict types which can be instantiated during deserializa SnakeYaml's Constructor() class does not restrict types which can be instantiated during deserialization. Deserializing yaml content provided by an attacker can lead to remote code execution. We recommend using SnakeYaml's SafeConsturctor when parsing untrusted content to restrict deserialization. We recommend upgrading to version 2.0 and beyond.
nvd
CVE-2022-41854MEDIUMCVSS 6.5fixed in 1.322022-11-11
CVE-2022-41854 [MEDIUM] CWE-121 CVE-2022-41854: Those using Snakeyaml to parse untrusted YAML files may be vulnerable to Denial of Service attacks ( Those using Snakeyaml to parse untrusted YAML files may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stack overflow. This effect may support a denial of service attack.
nvd
CVE-2022-38752MEDIUMCVSS 6.5fixed in 1.322022-09-05
CVE-2022-38752 [MEDIUM] CWE-121 CVE-2022-38752: Using snakeYAML to parse untrusted YAML files may be vulnerable to Denial of Service attacks (DOS). Using snakeYAML to parse untrusted YAML files may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stack-overflow.
nvd
CVE-2022-38751MEDIUMCVSS 6.5fixed in 1.312022-09-05
CVE-2022-38751 [MEDIUM] CWE-121 CVE-2022-38751: Using snakeYAML to parse untrusted YAML files may be vulnerable to Denial of Service attacks (DOS). Using snakeYAML to parse untrusted YAML files may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stackoverflow.
nvd
CVE-2022-38750MEDIUMCVSS 5.5fixed in 1.312022-09-05
CVE-2022-38750 [MEDIUM] CWE-121 CVE-2022-38750: Using snakeYAML to parse untrusted YAML files may be vulnerable to Denial of Service attacks (DOS). Using snakeYAML to parse untrusted YAML files may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stackoverflow.
nvd
CVE-2022-38749MEDIUMCVSS 6.5fixed in 1.312022-09-05
CVE-2022-38749 [MEDIUM] CWE-121 CVE-2022-38749: Using snakeYAML to parse untrusted YAML files may be vulnerable to Denial of Service attacks (DOS). Using snakeYAML to parse untrusted YAML files may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stackoverflow.
nvd
CVE-2022-25857HIGHCVSS 7.5fixed in 1.312022-08-30
CVE-2022-25857 [HIGH] CWE-776 CVE-2022-25857: The package org.yaml:snakeyaml from 0 and before 1.31 are vulnerable to Denial of Service (DoS) due The package org.yaml:snakeyaml from 0 and before 1.31 are vulnerable to Denial of Service (DoS) due missing to nested depth limitation for collections.
nvd
CVE-2017-18640HIGHCVSS 7.5fixed in 1.262019-12-12
CVE-2017-18640 [HIGH] CVE-2017-18640: The Alias feature in SnakeYAML before 1.26 allows entity expansion during a load operation, a relate The Alias feature in SnakeYAML before 1.26 allows entity expansion during a load operation, a related issue to CVE-2003-1564.
nvd