Lucene search

K

6 matches found

CVE
CVE
•added 2019/12/16 8:15 p.m.•82 views

CVE-2019-10773

In Yarn before 1.21.1, the package install functionality can be abused to generate arbitrary symlinks on the host filesystem by using specially crafted "bin" keys. Existing files could be overwritten depending on the current user permission set.

7.8CVSS7.5AI score0.00571EPSS
CVE
CVE
•added 2020/02/24 3:15 p.m.•82 views

CVE-2020-8131

Arbitrary filesystem write vulnerability in Yarn before 1.22.0 allows attackers to write to any path on the filesystem and potentially lead to arbitrary code execution by forcing the user to install a malicious package.

7.5CVSS7.7AI score0.00856EPSS
CVE
CVE
•added 2020/03/15 6:15 p.m.•73 views

CVE-2019-15608

The package integrity validation in yarn

5.9CVSS5.6AI score0.00185EPSS
CVE
CVE
•added 2019/07/30 9:15 p.m.•68 views

CVE-2019-5448

Yarn before 1.17.3 is vulnerable to Missing Encryption of Sensitive Data due to HTTP URLs in lockfile causing unencrypted authentication data to be sent over the network.

8.1CVSS7.8AI score0.00107EPSS
CVE
CVE
•added 2024/02/04 8:15 p.m.•61 views

CVE-2021-4435

An untrusted search path vulnerability was found in Yarn. When a victim runs certain Yarn commands in a directory with attacker-controlled content, malicious commands could be executed in unexpected ways.

7.8CVSS7.6AI score0.0004EPSS
CVE
CVE
•added 2025/07/28 7:15 a.m.•10 views

CVE-2025-8262

A vulnerability was found in yarnpkg Yarn up to 1.22.22. It has been classified as problematic. Affected is the function explodeHostedGitFragment of the file src/resolvers/exotics/hosted-git-resolver.js. The manipulation leads to inefficient regular expression complexity. It is possible to launch t...

7.5CVSS7.2AI score0.00062EPSS