Количество 2
Количество 2

CVE-2013-4660
почти 12 лет назад
The JS-YAML module before 2.0.5 for Node.js parses input without properly considering the unsafe !!js/function tag, which allows remote attackers to execute arbitrary code via a crafted string that triggers an eval operation.
CVSS2: 6.8
EPSS: Средний
GHSA-xxvw-45rp-3mj2
больше 7 лет назад
Deserialization Code Execution in js-yaml
EPSS: Средний
Уязвимостей на страницу
20
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | CVE-2013-4660 The JS-YAML module before 2.0.5 for Node.js parses input without properly considering the unsafe !!js/function tag, which allows remote attackers to execute arbitrary code via a crafted string that triggers an eval operation. | CVSS2: 6.8 | 66% Средний | почти 12 лет назад |
GHSA-xxvw-45rp-3mj2 Deserialization Code Execution in js-yaml | 66% Средний | больше 7 лет назад |
Уязвимостей на страницу
20