CVE-2013-4660
Severity CVSS v4.0:
Pending analysis
Type:
CWE-20
Input Validation
Publication date:
28/06/2013
Last modified:
02/12/2025
Description
The JS-YAML module before 2.0.5 for Node.js parses input without properly considering the unsafe !!js/function tag, which allows remote attackers to execute arbitrary code via a crafted string that triggers an eval operation.
Impact
Base Score 2.0
6.80
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:nodeca:js-yaml:*:*:*:*:*:*:*:* | 2.0.4 (including) | |
| cpe:2.3:a:nodeca:js-yaml:0.2.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:nodeca:js-yaml:0.2.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:nodeca:js-yaml:0.2.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:nodeca:js-yaml:0.3.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:nodeca:js-yaml:0.3.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:nodeca:js-yaml:0.3.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:nodeca:js-yaml:0.3.3:*:*:*:*:*:*:* | ||
| cpe:2.3:a:nodeca:js-yaml:0.3.4:*:*:*:*:*:*:* | ||
| cpe:2.3:a:nodeca:js-yaml:0.3.5:*:*:*:*:*:*:* | ||
| cpe:2.3:a:nodeca:js-yaml:0.3.6:*:*:*:*:*:*:* | ||
| cpe:2.3:a:nodeca:js-yaml:0.3.7:*:*:*:*:*:*:* | ||
| cpe:2.3:a:nodeca:js-yaml:1.0.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:nodeca:js-yaml:1.0.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:nodeca:js-yaml:1.0.2:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page



