{
  "version": "1",
  "package": [
    {
      "name": "yaml-cpp",
      "layer": "meta-ros-common",
      "version": "0.6.2",
      "products": [
        {
          "product": "yaml-cpp",
          "cvesInRecord": "Yes"
        }
      ],
      "issue": [
        {
          "id": "CVE-2017-11692",
          "summary": "The function \"Token& Scanner::peek\" in scanner.cpp in yaml-cpp 0.5.3 and earlier allows remote attackers to cause a denial of service (assertion failure and application exit) via a '!2' string.",
          "scorev2": "5.0",
          "scorev3": "7.5",
          "vector": "NETWORK",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
          "status": "Patched",
          "link": "https://nvd.nist.gov/vuln/detail/CVE-2017-11692"
        },
        {
          "id": "CVE-2017-5950",
          "summary": "The SingleDocParser::HandleNode function in yaml-cpp (aka LibYaml-C++) 0.5.3 allows remote attackers to cause a denial of service (stack consumption and application crash) via a crafted YAML file.",
          "scorev2": "4.3",
          "scorev3": "5.5",
          "vector": "NETWORK",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
          "status": "Patched",
          "link": "https://nvd.nist.gov/vuln/detail/CVE-2017-5950"
        },
        {
          "id": "CVE-2018-20573",
          "summary": "The Scanner::EnsureTokensInQueue function in yaml-cpp (aka LibYaml-C++) 0.6.2 allows remote attackers to cause a denial of service (stack consumption and application crash) via a crafted YAML file.",
          "scorev2": "4.3",
          "scorev3": "6.5",
          "vector": "NETWORK",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
          "status": "Unpatched",
          "link": "https://nvd.nist.gov/vuln/detail/CVE-2018-20573"
        },
        {
          "id": "CVE-2018-20574",
          "summary": "The SingleDocParser::HandleFlowMap function in yaml-cpp (aka LibYaml-C++) 0.6.2 allows remote attackers to cause a denial of service (stack consumption and application crash) via a crafted YAML file.",
          "scorev2": "4.3",
          "scorev3": "6.5",
          "vector": "NETWORK",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
          "status": "Unpatched",
          "link": "https://nvd.nist.gov/vuln/detail/CVE-2018-20574"
        },
        {
          "id": "CVE-2019-6285",
          "summary": "The SingleDocParser::HandleFlowSequence function in yaml-cpp (aka LibYaml-C++) 0.6.2 allows remote attackers to cause a denial of service (stack consumption and application crash) via a crafted YAML file.",
          "scorev2": "4.3",
          "scorev3": "6.5",
          "vector": "NETWORK",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
          "status": "Unpatched",
          "link": "https://nvd.nist.gov/vuln/detail/CVE-2019-6285"
        },
        {
          "id": "CVE-2019-6292",
          "summary": "An issue was discovered in singledocparser.cpp in yaml-cpp (aka LibYaml-C++) 0.6.2. Stack Exhaustion occurs in YAML::SingleDocParser, and there is a stack consumption problem caused by recursive stack frames: HandleCompactMap, HandleMap, HandleFlowSequence, HandleSequence, HandleNode. Remote attackers could leverage this vulnerability to cause a denial-of-service via a cpp file.",
          "scorev2": "4.3",
          "scorev3": "6.5",
          "vector": "NETWORK",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
          "status": "Unpatched",
          "link": "https://nvd.nist.gov/vuln/detail/CVE-2019-6292"
        }
      ]
    }
  ]
}