Количество 7
Количество 7
GHSA-rprw-h62v-c2w7
PyYAML insecurely deserializes YAML strings leading to arbitrary code execution

CVE-2017-18342
In PyYAML before 5.1, the yaml.load() API could execute arbitrary code if used with untrusted data. The load() function has been deprecated in version 5.1 and the 'UnsafeLoader' has been introduced for backward compatibility with the function.

CVE-2017-18342
In PyYAML before 5.1, the yaml.load() API could execute arbitrary code if used with untrusted data. The load() function has been deprecated in version 5.1 and the 'UnsafeLoader' has been introduced for backward compatibility with the function.

CVE-2017-18342
In PyYAML before 5.1, the yaml.load() API could execute arbitrary code if used with untrusted data. The load() function has been deprecated in version 5.1 and the 'UnsafeLoader' has been introduced for backward compatibility with the function.
CVE-2017-18342
In PyYAML before 5.1, the yaml.load() API could execute arbitrary code ...

BDU:2023-07605
Уязвимость компонента yaml.load() библиотеки парсинга YAML для Python PyYAML, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
ELSA-2022-9341
ELSA-2022-9341: ol-automation-manager security update (IMPORTANT)
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
GHSA-rprw-h62v-c2w7 PyYAML insecurely deserializes YAML strings leading to arbitrary code execution | CVSS3: 9.8 | 5% Низкий | больше 6 лет назад | |
![]() | CVE-2017-18342 In PyYAML before 5.1, the yaml.load() API could execute arbitrary code if used with untrusted data. The load() function has been deprecated in version 5.1 and the 'UnsafeLoader' has been introduced for backward compatibility with the function. | CVSS3: 9.8 | 5% Низкий | почти 7 лет назад |
![]() | CVE-2017-18342 In PyYAML before 5.1, the yaml.load() API could execute arbitrary code if used with untrusted data. The load() function has been deprecated in version 5.1 and the 'UnsafeLoader' has been introduced for backward compatibility with the function. | CVSS3: 8.1 | 5% Низкий | почти 7 лет назад |
![]() | CVE-2017-18342 In PyYAML before 5.1, the yaml.load() API could execute arbitrary code if used with untrusted data. The load() function has been deprecated in version 5.1 and the 'UnsafeLoader' has been introduced for backward compatibility with the function. | CVSS3: 9.8 | 5% Низкий | почти 7 лет назад |
CVE-2017-18342 In PyYAML before 5.1, the yaml.load() API could execute arbitrary code ... | CVSS3: 9.8 | 5% Низкий | почти 7 лет назад | |
![]() | BDU:2023-07605 Уязвимость компонента yaml.load() библиотеки парсинга YAML для Python PyYAML, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании | CVSS3: 9.8 | 5% Низкий | почти 7 лет назад |
ELSA-2022-9341 ELSA-2022-9341: ol-automation-manager security update (IMPORTANT) | около 3 лет назад |
Уязвимостей на страницу