{"id":"JLSEC-2026-23","details":"The SingleDocParser::HandleNode function in yaml-cpp (aka LibYaml-C++) 0.5.3 allows remote attackers to cause a denial of service (stack consumption and application crash) via a crafted YAML file.","modified":"2026-04-03T13:15:06.957796Z","published":"2026-04-03T13:08:33.428Z","upstream":["CVE-2017-5950"],"database_specific":{"sources":[{"published":"2017-04-03T05:59:00.800Z","url":"https://services.nvd.nist.gov/rest/json/cves/2.0?cveId=CVE-2017-5950","imported":"2026-04-03T04:08:06.329Z","modified":"2025-11-03T22:15:43.977Z","id":"CVE-2017-5950","html_url":"https://nvd.nist.gov/vuln/detail/CVE-2017-5950"}],"license":"CC-BY-4.0"},"references":[{"type":"WEB","url":"http://www.securityfocus.com/bid/97307"},{"type":"WEB","url":"https://github.com/jbeder/yaml-cpp/issues/459"},{"type":"WEB","url":"http://seclists.org/fulldisclosure/2024/Nov/0"},{"type":"WEB","url":"http://www.securityfocus.com/bid/97307"},{"type":"WEB","url":"https://github.com/jbeder/yaml-cpp/issues/459"}],"affected":[{"package":{"name":"yaml_cpp_jll","ecosystem":"Julia","purl":"pkg:julia/yaml_cpp_jll?uuid=01fea8cc-7d33-533a-824e-56a766f4ffe8"},"ranges":[{"type":"SEMVER","events":[{"introduced":"0"},{"fixed":"0.6.3+0"}]}],"database_specific":{"source":"https://github.com/JuliaLang/SecurityAdvisories.jl/tree/generated/osv/2026/JLSEC-2026-23.json"}}],"schema_version":"1.7.5"}