JYaml through 1.3 allows remote code execution during deserialization of a malicious payload through the load() function. NOTE: this is a discontinued product.
{
"nvd_published_at": "2020-02-19T17:15:00Z",
"severity": "CRITICAL",
"github_reviewed_at": "2022-06-23T06:57:31Z",
"github_reviewed": true,
"cwe_ids": [
"CWE-502"
]
}