CVE-2014-9130
UNKNOWN
Published 2014-12-08T16:00:00
Actions:
Expert Analysis
Professional remediation guidance
Get tailored security recommendations from our analyst team for CVE-2014-9130. We'll provide specific mitigation strategies based on your environment and risk profile.
No CVSS data available
Description
scanner.c in LibYAML 0.1.5 and 0.1.6, as used in the YAML-LibYAML (aka YAML-XS) module for Perl, allows context-dependent attackers to cause a denial of service (assertion failure and crash) via vectors involving line-wrapping.
Available Exploits
No exploits available for this CVE.
Related News
No news articles found for this CVE.
GitHub Security Advisories
Community-driven vulnerability intelligence from GitHub
⚠ Unreviewed
MODERATE
GHSA-wrq2-fvvw-grpm
Advisory Details
scanner.c in LibYAML 0.1.5 and 0.1.6, as used in the YAML-LibYAML (aka YAML-XS) module for Perl, allows context-dependent attackers to cause a denial of service (assertion failure and crash) via vectors involving line-wrapping.
CVSS Scoring
CVSS Score
5.0
References
Advisory provided by GitHub Security Advisory Database. Published: May 17, 2022, Modified: May 17, 2022
References
HackerOne Reports
usa
Ruby
Memory Corruption - Generic
Published: 2014-12-08T16:00:00
Last Modified: 2024-08-06T13:33:13.456Z
Copied to clipboard!