{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-03T02:47:10.037","vulnerabilities":[{"cve":{"id":"CVE-2021-4435","sourceIdentifier":"patrick@puiterwijk.org","published":"2024-02-04T20:15:45.657","lastModified":"2024-11-21T06:37:43.400","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"An untrusted search path vulnerability was found in Yarn. When a victim runs certain Yarn commands in a directory with attacker-controlled content, malicious commands could be executed in unexpected ways."},{"lang":"es","value":"Se encontró una vulnerabilidad de ruta de búsqueda no confiable en Yarn. Cuando una víctima ejecuta ciertos comandos de Yarn en un directorio con contenido controlado por un atacante, se podrían ejecutar comandos maliciosos de formas inesperadas."}],"metrics":{"cvssMetricV31":[{"source":"patrick@puiterwijk.org","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H","baseScore":7.7,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.0,"impactScore":6.0},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","baseScore":7.8,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.8,"impactScore":5.9}]},"weaknesses":[{"source":"patrick@puiterwijk.org","type":"Secondary","description":[{"lang":"en","value":"CWE-426"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-426"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:yarnpkg:yarn:*:*:*:*:*:*:*:*","versionEndExcluding":"1.22.13","matchCriteriaId":"BCBACDE9-403C-4A92-8F39-ABCF4216F7AA"}]}]}],"references":[{"url":"https://access.redhat.com/security/cve/CVE-2021-4435","source":"patrick@puiterwijk.org","tags":["Third Party Advisory"]},{"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2262284","source":"patrick@puiterwijk.org","tags":["Issue Tracking"]},{"url":"https://github.com/yarnpkg/yarn/commit/67fcce88935e45092ffa2674c08053f1ef5268a1","source":"patrick@puiterwijk.org","tags":["Patch"]},{"url":"https://github.com/yarnpkg/yarn/releases/tag/v1.22.13","source":"patrick@puiterwijk.org","tags":["Release Notes"]},{"url":"https://access.redhat.com/security/cve/CVE-2021-4435","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]},{"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2262284","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Issue Tracking"]},{"url":"https://github.com/yarnpkg/yarn/commit/67fcce88935e45092ffa2674c08053f1ef5268a1","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"]},{"url":"https://github.com/yarnpkg/yarn/releases/tag/v1.22.13","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Release Notes"]}]}}]}