Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
7.5
CVE-2023-2251
- EPSS 0.42%
- Published 24.04.2023 15:15:08
- Last modified 21.11.2024 07:58:14
Uncaught Exception in GitHub repository eemeli/yaml prior to 2.0.0-5.
7.5
CVE-2022-3064
- EPSS 1.86%
- Published 27.12.2022 22:15:14
- Last modified 14.04.2025 17:15:25
Parsing malicious or large YAML documents can consume excessive amounts of CPU or memory.
5.5
CVE-2021-4235
- EPSS 0.03%
- Published 27.12.2022 22:15:11
- Last modified 11.04.2025 17:15:35
Due to unbounded alias chasing, a maliciously crafted YAML file can cause the system to consume significant system resources. If parsing user input, this may be used as a denial of service vector.
7.5
CVE-2022-28948
- EPSS 1.45%
- Published 19.05.2022 20:15:10
- Last modified 21.11.2024 06:58:14
An issue in the Unmarshal function in Go-Yaml v3 causes the program to crash when attempting to deserialize invalid input.
1