Page 4 of 16 results (0.006 seconds)

CVSS: 6.8EPSS: 96%CPEs: 20EXPL: 2

The JS-YAML module before 2.0.5 for Node.js parses input without properly considering the unsafe !!js/function tag, which allows remote attackers to execute arbitrary code via a crafted string that triggers an eval operation. El módulo JS-YAML antes de v2.0.5 para Node.js analiza la entrada sin considerar adecuadamente etiqueta insegura !!js/function, lo que permite a atacantes remotos ejecutar código arbitrario a través de una cadena modificada que desencadena una operación eval. • https://www.exploit-db.com/exploits/28655 http://portal.nodesecurity.io/advisories/js-yaml https://nealpoole.com/blog/2013/06/code-execution-via-yaml-in-js-yaml-nodejs-module • CWE-20: Improper Input Validation •