We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
There was an error while loading. Please reload this page.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
YAML support for the Go language.
Dependency Hierarchy:
Parsing malicious or large YAML documents can consume excessive amounts of CPU or memory.
Publish Date: 2022-12-27
URL: CVE-2022-3064
Base Score Metrics:
Type: Upgrade version
Origin: https://pkg.go.dev/vuln/GO-2022-0956
Release Date: 2022-12-27
Fix Resolution: v2.2.4
The text was updated successfully, but these errors were encountered:
No branches or pull requests
Uh oh!
There was an error while loading. Please reload this page.
CVE-2022-3064 - High Severity Vulnerability
YAML support for the Go language.
Dependency Hierarchy:
Parsing malicious or large YAML documents can consume excessive amounts of CPU or memory.
Publish Date: 2022-12-27
URL: CVE-2022-3064
Base Score Metrics:
Type: Upgrade version
Origin: https://pkg.go.dev/vuln/GO-2022-0956
Release Date: 2022-12-27
Fix Resolution: v2.2.4
The text was updated successfully, but these errors were encountered: