The JS-YAML module before 2.0.5 for Node.js parses input without properly considering the unsafe !!js/function tag, which allows remote attackers to execute arbitrary code via a crafted string that triggers an eval operation.
| Package (Ecosystem) | Introduced | Fixed | Limit |
|---|---|---|---|
| js-yaml(npm) | 0 | 2.0.5 | N/A |
CVSS Metrics