Using snakeYAML to parse untrusted YAML files may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stack-overflow.
Metrics
Affected Vendors & Products
Advisories
Source | ID | Title |
---|---|---|
![]() |
EUVD-2022-6769 | Using snakeYAML to parse untrusted YAML files may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stack-overflow. |
![]() |
GHSA-9w3m-gqgf-c4p9 | snakeYAML before 1.32 vulnerable to Denial of Service due to Out-of-bounds Write |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.

Status: PUBLISHED
Assigner: Google
Published:
Updated: 2024-08-03T11:02:14.529Z
Reserved: 2022-08-25T00:00:00
Link: CVE-2022-38752

Updated: 2024-08-03T11:02:14.529Z

Status : Modified
Published: 2022-09-05T10:15:09.847
Modified: 2024-11-21T07:17:01.483
Link: CVE-2022-38752


No data.