Known Vulnerabilities for products from Yaml Project
Listed below are 4 of the newest known vulnerabilities associated with the vendor "Yaml Project".
These CVEs are retrieved based on exact matches on listed vendor information (CPE data) as well as a keyword search to ensure the newest vulnerabilities with no officially listed vendor information are still displayed.
Data on known vulnerable products is also displayed based on information from known CPEs, each product links to its respective vulnerability page.
Known Vulnerabilities
| CVE | Shortened Description | Severity | Publish Date | Last Modified |
|---|---|---|---|---|
| CVE-2026-40156 json | Not Provided | 2026-04-10 | 2026-04-13 | |
| CVE-2026-34730 json | Not Provided | 2026-04-02 | 2026-04-03 | |
| CVE-2026-34178 json | Not Provided | 2026-04-09 | 2026-04-09 | |
| CVE-2023-2251 json | Uncaught Exception in GitHub repository eemeli/yaml prior to 2.0.0-5. | 7.5 - HIGH | 2023-04-24 | 2023-09-07 |
| CVE-2022-28948 json | An issue in the Unmarshal function in Go-Yaml v3 causes the program to crash when attempting to deserialize invalid input. | 7.5 - HIGH | 2022-05-19 | 2022-10-28 |
| CVE-2022-3064 json | Parsing malicious or large YAML documents can consume excessive amounts of CPU or memory. | 7.5 - HIGH | 2022-12-27 | 2023-09-15 |
| CVE-2021-4235 json | Due to unbounded alias chasing, a maliciously crafted YAML file can cause the system to consume significant system resources.... | 5.5 - MEDIUM | 2022-12-27 | 2023-07-06 |