CVE-2013-4660

The JS-YAML module before 2.0.5 for Node.js parses input without properly considering the unsafe !!js/function tag, which allows remote attackers to execute arbitrary code via a crafted string that triggers an eval operation.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
6.8 UNKNOWN
NETWORK
MEDIUM
AV:N/AC:M/Au:N/C:P/I:P/A:P
mitreCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 98%
VendorProductVersion
js-yaml_projectjs-yaml
𝑥
≤ 2.0.4
js-yaml_projectjs-yaml
0.2.0
js-yaml_projectjs-yaml
0.2.1
js-yaml_projectjs-yaml
0.2.2
js-yaml_projectjs-yaml
0.3.0
js-yaml_projectjs-yaml
0.3.1
js-yaml_projectjs-yaml
0.3.2
js-yaml_projectjs-yaml
0.3.3
js-yaml_projectjs-yaml
0.3.4
js-yaml_projectjs-yaml
0.3.5
js-yaml_projectjs-yaml
0.3.6
js-yaml_projectjs-yaml
0.3.7
js-yaml_projectjs-yaml
1.0.0
js-yaml_projectjs-yaml
1.0.1
js-yaml_projectjs-yaml
1.0.2
js-yaml_projectjs-yaml
1.0.3
js-yaml_projectjs-yaml
2.0.0
js-yaml_projectjs-yaml
2.0.1
js-yaml_projectjs-yaml
2.0.2
js-yaml_projectjs-yaml
2.0.3
𝑥
= Vulnerable software versions