JYaml through 1.3 allows remote code execution during deserialization of a malicious payload through the load() function. NOTE: this is a discontinued product.
{
"cwe_ids": [
"CWE-502"
],
"github_reviewed": true,
"github_reviewed_at": "2022-06-23T06:57:31Z",
"nvd_published_at": "2020-02-19T17:15:00Z",
"severity": "CRITICAL"
}