Security
Games
Windows
Linux
Android
IOS
News
Reviews
AI
CVE-2017-18342 Vulnerability Details
/
/
/
CVE-2017-18342 Metadata Quick Info
CVE Published: 27/06/2018
|
CVE Updated: 05/08/2024
|
CVE Year: 2017
Source: mitre
|
Vendor: n/a
|
Product: n/a
Status : PUBLISHED
CVE-2017-18342 Description
In PyYAML before 5.1, the yaml.load() API could execute arbitrary code if used with untrusted data. The load() function has been deprecated in version 5.1 and the \'UnsafeLoader\' has been introduced for backward compatibility with the function.
Metrics
CVSS Version: 3.1
|
Base Score: n/a
Vector: n/a
l➤ Exploitability Metrics:
Attack Vector (AV)*
Attack Complexity (AC)*
Privileges Required (PR)*
User Interaction (UI)*
Scope (S)*
l➤ Impact Metrics:
Confidentiality Impact (C)*
Integrity Impact (I)*
Availability Impact (A)*
Weakness Enumeration (CWE)
CWE-ID:
CWE Name: n/a
Source: n/a
Common Attack Pattern Enumeration and Classification (CAPEC)
CAPEC-ID:
CAPEC Description:
Source: NVD (National Vulnerability Database).
Last added CVEs
▸ CVE-2024-9999 ◂
Discovered: 12/11/2024
Status: PUBLISHED
▸ CVE-2024-9997 ◂
Discovered: 29/10/2024
Status: PUBLISHED
▸ CVE-2024-9996 ◂
Discovered: 29/10/2024
Status: PUBLISHED
Tags:
CVE-2017-18342 Vulnerability Details