CVE-2013-4660

The JS-YAML module before 2.0.5 for Node.js parses input without properly considering the unsafe !!js/function tag, which allows remote attackers to execute arbitrary code via a crafted string that triggers an eval operation.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
6.8 UNKNOWN
NETWORK
MEDIUM
AV:N/AC:M/Au:N/C:P/I:P/A:P
mitreCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 98%
VendorProductVersion
nodecajs-yaml
𝑥
≤ 2.0.4
nodecajs-yaml
0.2.0
nodecajs-yaml
0.2.1
nodecajs-yaml
0.2.2
nodecajs-yaml
0.3.0
nodecajs-yaml
0.3.1
nodecajs-yaml
0.3.2
nodecajs-yaml
0.3.3
nodecajs-yaml
0.3.4
nodecajs-yaml
0.3.5
nodecajs-yaml
0.3.6
nodecajs-yaml
0.3.7
nodecajs-yaml
1.0.0
nodecajs-yaml
1.0.1
nodecajs-yaml
1.0.2
nodecajs-yaml
1.0.3
nodecajs-yaml
2.0.0
nodecajs-yaml
2.0.1
nodecajs-yaml
2.0.2
nodecajs-yaml
2.0.3
𝑥
= Vulnerable software versions