Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2019-6285

Опубликовано: 14 янв. 2019
Источник: nvd
CVSS3: 6.5
CVSS2: 4.3
EPSS Низкий

Описание

The SingleDocParser::HandleFlowSequence function in yaml-cpp (aka LibYaml-C++) 0.6.2 allows remote attackers to cause a denial of service (stack consumption and application crash) via a crafted YAML file.

Уязвимые конфигурации

Конфигурация 1
cpe:2.3:a:yaml-cpp_project:yaml-cpp:0.6.2:*:*:*:*:*:*:*

EPSS

Процентиль: 71%
0.00689
Низкий

6.5 Medium

CVSS3

4.3 Medium

CVSS2

Дефекты

CWE-674

Связанные уязвимости

CVSS3: 6.5
ubuntu
около 7 лет назад

The SingleDocParser::HandleFlowSequence function in yaml-cpp (aka LibYaml-C++) 0.6.2 allows remote attackers to cause a denial of service (stack consumption and application crash) via a crafted YAML file.

CVSS3: 3.7
redhat
около 7 лет назад

The SingleDocParser::HandleFlowSequence function in yaml-cpp (aka LibYaml-C++) 0.6.2 allows remote attackers to cause a denial of service (stack consumption and application crash) via a crafted YAML file.

CVSS3: 6.5
msrc
больше 5 лет назад

The SingleDocParser::HandleFlowSequence function in yaml-cpp (aka LibYaml-C++) 0.6.2 allows remote attackers to cause a denial of service (stack consumption and application crash) via a crafted YAML file.

CVSS3: 6.5
debian
около 7 лет назад

The SingleDocParser::HandleFlowSequence function in yaml-cpp (aka LibY ...

CVSS3: 6.5
github
больше 3 лет назад

The SingleDocParser::HandleFlowSequence function in yaml-cpp (aka LibYaml-C++) 0.6.2 allows remote attackers to cause a denial of service (stack consumption and application crash) via a crafted YAML file.

EPSS

Процентиль: 71%
0.00689
Низкий

6.5 Medium

CVSS3

4.3 Medium

CVSS2

Дефекты

CWE-674