JS-YAML Node.js module before 2.0.5 allows remote code execution via crafted inpu
Reporter | Title | Published | Views | Family All 14 |
---|---|---|---|---|
![]() | CVE-2013-4660 | 28 Jun 201314:00 | – | cvelist |
![]() | Nodejs - 'js-yaml load()' Code Exec (Metasploit) | 30 Sep 201300:00 | – | exploitdb |
![]() | Nodejs js-yaml load() Code Execution | 16 Sep 201318:37 | – | metasploit |
![]() | Code injection | 28 Jun 201314:55 | – | prion |
![]() | Nodejs js-yaml load() Code Exec | 9 Oct 201300:00 | – | seebug |
![]() | Nodejs js-yaml load() Code Execution Vulnerability | 26 Sep 201300:00 | – | zdt |
![]() | Deserialization Code Execution | 17 Oct 201519:41 | – | nodejs |
![]() | Deserialization Code Execution in js-yaml | 24 Oct 201718:33 | – | osv |
![]() | CVE-2013-4660 | 28 Jun 201314:55 | – | nvd |
![]() | Nodejs js-yaml load() Code Execution | 25 Sep 201300:00 | – | packetstorm |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo