Vulnerability Details CVE-2019-1010183
serde serde_yaml 0.6.0 to 0.8.3 is affected by: Uncontrolled Recursion. The impact is: Denial of service by aborting. The component is: from_* functions (all deserialization functions). The attack vector is: Parsing a malicious YAML file. The fixed version is: 0.8.4 and later.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.004
EPSS Ranking 57.7%
CVSS Severity
CVSS v3 Score 6.5
CVSS v2 Score 4.3
Products affected by CVE-2019-1010183
-
cpe:2.3:a:serde-yaml_project:serde-yaml:0.6.0
-
cpe:2.3:a:serde-yaml_project:serde-yaml:0.6.1
-
cpe:2.3:a:serde-yaml_project:serde-yaml:0.6.2
-
cpe:2.3:a:serde-yaml_project:serde-yaml:0.7.0
-
cpe:2.3:a:serde-yaml_project:serde-yaml:0.7.1
-
cpe:2.3:a:serde-yaml_project:serde-yaml:0.7.2
-
cpe:2.3:a:serde-yaml_project:serde-yaml:0.7.3
-
cpe:2.3:a:serde-yaml_project:serde-yaml:0.7.4
-
cpe:2.3:a:serde-yaml_project:serde-yaml:0.7.5
-
cpe:2.3:a:serde-yaml_project:serde-yaml:0.8.0
-
cpe:2.3:a:serde-yaml_project:serde-yaml:0.8.1
-
cpe:2.3:a:serde-yaml_project:serde-yaml:0.8.2
-
cpe:2.3:a:serde-yaml_project:serde-yaml:0.8.3