Project Subscriptions
| Vendors | Products |
|---|---|
|
Redhat
Subscribe
|
Amq Clients
Subscribe
Amq Streams
Subscribe
Enterprise Linux
Subscribe
Jboss Enterprise Application Platform
Subscribe
Jboss Enterprise Application Platform Eus
Subscribe
Jboss Enterprise Bpms Platform
Subscribe
Ocp Tools
Subscribe
Openshift
Subscribe
Openshift Application Runtimes
Subscribe
Quarkus
Subscribe
Red Hat Single Sign On
Subscribe
Rhosemc
Subscribe
Satellite
Subscribe
|
|
Snakeyaml Project
Subscribe
|
Snakeyaml
Subscribe
|
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-mjmj-j48q-9wg2 | SnakeYaml Constructor Deserialization Remote Code Execution |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Wed, 09 Jul 2025 15:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-1066 |
Wed, 18 Jun 2025 08:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Tue, 25 Feb 2025 02:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Redhat jboss Enterprise Application Platform Eus
|
|
| CPEs | cpe:/a:redhat:jboss_enterprise_application_platform_eus:7.1::el7 cpe:/a:redhat:jboss_enterprise_application_platform_eus:7.3::el7 |
|
| Vendors & Products |
Redhat jboss Enterprise Application Platform Eus
|
Thu, 13 Feb 2025 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | SnakeYaml's Constructor() class does not restrict types which can be instantiated during deserialization. Deserializing yaml content provided by an attacker can lead to remote code execution. We recommend using SnakeYaml's SafeConsturctor when parsing untrusted content to restrict deserialization. We recommend upgrading to version 2.0 and beyond. | SnakeYaml's Constructor() class does not restrict types which can be instantiated during deserialization. Deserializing yaml content provided by an attacker can lead to remote code execution. We recommend using SnakeYaml's SafeConsturctor when parsing untrusted content to restrict deserialization. We recommend upgrading to version 2.0 and beyond. |
Wed, 18 Sep 2024 08:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: Google
Published:
Updated: 2025-06-18T08:32:58.546Z
Reserved: 2022-04-26T08:32:53.188Z
Link: CVE-2022-1471
Updated: 2024-08-03T00:03:06.269Z
Status : Modified
Published: 2022-12-01T11:15:10.553
Modified: 2025-06-18T09:15:47.243
Link: CVE-2022-1471
OpenCVE Enrichment
No data.
Github GHSA