The JS-YAML module before 2.0.5 for Node.js parses input without properly considering the unsafe !!js/function tag, which allows remote attackers to execute arbitrary code via a crafted string that triggers an eval operation.
History

Tue, 02 Dec 2025 13:30:00 +0000

Type Values Removed Values Added
First Time appeared Nodeca
Nodeca js-yaml
CPEs cpe:2.3:a:js-yaml_project:js-yaml:*:*:*:*:*:*:*:*
cpe:2.3:a:js-yaml_project:js-yaml:0.2.0:*:*:*:*:*:*:*
cpe:2.3:a:js-yaml_project:js-yaml:0.2.1:*:*:*:*:*:*:*
cpe:2.3:a:js-yaml_project:js-yaml:0.2.2:*:*:*:*:*:*:*
cpe:2.3:a:js-yaml_project:js-yaml:0.3.0:*:*:*:*:*:*:*
cpe:2.3:a:js-yaml_project:js-yaml:0.3.1:*:*:*:*:*:*:*
cpe:2.3:a:js-yaml_project:js-yaml:0.3.2:*:*:*:*:*:*:*
cpe:2.3:a:js-yaml_project:js-yaml:0.3.3:*:*:*:*:*:*:*
cpe:2.3:a:js-yaml_project:js-yaml:0.3.4:*:*:*:*:*:*:*
cpe:2.3:a:js-yaml_project:js-yaml:0.3.5:*:*:*:*:*:*:*
cpe:2.3:a:js-yaml_project:js-yaml:0.3.6:*:*:*:*:*:*:*
cpe:2.3:a:js-yaml_project:js-yaml:0.3.7:*:*:*:*:*:*:*
cpe:2.3:a:js-yaml_project:js-yaml:1.0.0:*:*:*:*:*:*:*
cpe:2.3:a:js-yaml_project:js-yaml:1.0.1:*:*:*:*:*:*:*
cpe:2.3:a:js-yaml_project:js-yaml:1.0.2:*:*:*:*:*:*:*
cpe:2.3:a:js-yaml_project:js-yaml:1.0.3:*:*:*:*:*:*:*
cpe:2.3:a:js-yaml_project:js-yaml:2.0.0:*:*:*:*:*:*:*
cpe:2.3:a:js-yaml_project:js-yaml:2.0.1:*:*:*:*:*:*:*
cpe:2.3:a:js-yaml_project:js-yaml:2.0.2:*:*:*:*:*:*:*
cpe:2.3:a:js-yaml_project:js-yaml:2.0.3:*:*:*:*:*:*:*
cpe:2.3:a:nodeca:js-yaml:*:*:*:*:*:*:*:*
cpe:2.3:a:nodeca:js-yaml:0.2.0:*:*:*:*:*:*:*
cpe:2.3:a:nodeca:js-yaml:0.2.1:*:*:*:*:*:*:*
cpe:2.3:a:nodeca:js-yaml:0.2.2:*:*:*:*:*:*:*
cpe:2.3:a:nodeca:js-yaml:0.3.0:*:*:*:*:*:*:*
cpe:2.3:a:nodeca:js-yaml:0.3.1:*:*:*:*:*:*:*
cpe:2.3:a:nodeca:js-yaml:0.3.2:*:*:*:*:*:*:*
cpe:2.3:a:nodeca:js-yaml:0.3.3:*:*:*:*:*:*:*
cpe:2.3:a:nodeca:js-yaml:0.3.4:*:*:*:*:*:*:*
cpe:2.3:a:nodeca:js-yaml:0.3.5:*:*:*:*:*:*:*
cpe:2.3:a:nodeca:js-yaml:0.3.6:*:*:*:*:*:*:*
cpe:2.3:a:nodeca:js-yaml:0.3.7:*:*:*:*:*:*:*
cpe:2.3:a:nodeca:js-yaml:1.0.0:*:*:*:*:*:*:*
cpe:2.3:a:nodeca:js-yaml:1.0.1:*:*:*:*:*:*:*
cpe:2.3:a:nodeca:js-yaml:1.0.2:*:*:*:*:*:*:*
cpe:2.3:a:nodeca:js-yaml:1.0.3:*:*:*:*:*:*:*
cpe:2.3:a:nodeca:js-yaml:2.0.0:*:*:*:*:*:*:*
cpe:2.3:a:nodeca:js-yaml:2.0.1:*:*:*:*:*:*:*
cpe:2.3:a:nodeca:js-yaml:2.0.2:*:*:*:*:*:*:*
cpe:2.3:a:nodeca:js-yaml:2.0.3:*:*:*:*:*:*:*
Vendors & Products Js-yaml Project
Js-yaml Project js-yaml
Nodeca
Nodeca js-yaml

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published: 2013-06-28T14:00:00Z

Updated: 2024-09-17T02:11:39.386Z

Reserved: 2013-06-24T00:00:00Z

Link: CVE-2013-4660

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2013-06-28T14:55:02.803

Modified: 2025-12-02T13:29:14.470

Link: CVE-2013-4660

cve-icon Redhat

No data.