CVE-2020-1747

CRITICAL Year: 2020
CVSS v3 Score
9.8
Critical
CVSS v2 Score
10.0
Critical

Vulnerability Description

A vulnerability was discovered in the PyYAML library in versions before 5.3.1, where it is susceptible to arbitrary code execution when it processes untrusted YAML files through the full_load method or with the FullLoader loader. Applications that use the library to process untrusted input may be vulnerable to this flaw. An attacker could use this flaw to execute arbitrary code on the system by abusing the python/object/new constructor.

CVSS:9.8(Critical)

Snoopy before 2.0.0 has a security hole in exec cURL

CWE-202002
CVSS:9.8(Critical)

Varnish 2.0.6 writes data to a log file without sanitizing non-printable characters, which might allow remote attackers to modify a window's title, or possibly execute arbitrary commands or overwrite ...

CWE-202009
CVSS:9.8(Critical)

thttpd 2.25b0 writes data to a log file without sanitizing non-printable characters, which might allow remote attackers to modify a window's title, or possibly execute arbitrary commands or overwrite ...

CWE-202009
CVSS:9.8(Critical)

Transmission before 1.92 allows an attacker to cause a denial of service (crash) or possibly have other unspecified impact via a large number of tr arguments in a magnet link.

CWE-202010
CVSS:9.8(Critical)

gitolite before 1.4.1 does not filter src/ or hooks/ from path names.

CWE-202010