{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-21T01:41:45.875","vulnerabilities":[{"cve":{"id":"CVE-2024-21537","sourceIdentifier":"report@snyk.io","published":"2024-10-31T05:15:04.733","lastModified":"2026-04-15T00:35:42.020","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"Versions of the package lilconfig from 3.1.0 and before 3.1.1 are vulnerable to Arbitrary Code Execution due to the insecure usage of eval in the dynamicImport function. An attacker can exploit this vulnerability by passing a malicious input through the defaultLoaders function."},{"lang":"es","value":"Las versiones del paquete lilconfig de la versión 3.1.0 y anteriores a la 3.1.1 son vulnerables a la ejecución de código arbitrario debido al uso inseguro de eval en la función dynamicImport. Un atacante puede aprovechar esta vulnerabilidad al pasar una entrada maliciosa a través de la función defaultLoaders."}],"metrics":{"cvssMetricV31":[{"source":"report@snyk.io","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":8.8,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.9}]},"weaknesses":[{"source":"report@snyk.io","type":"Secondary","description":[{"lang":"en","value":"CWE-94"}]}],"references":[{"url":"https://github.com/antonk52/lilconfig/commit/2c68a1ab8764fc74acc46771e1ad39ab07a9b0a7","source":"report@snyk.io"},{"url":"https://github.com/antonk52/lilconfig/pull/48","source":"report@snyk.io"},{"url":"https://github.com/antonk52/lilconfig/releases/tag/v3.1.1","source":"report@snyk.io"},{"url":"https://security.snyk.io/vuln/SNYK-JS-LILCONFIG-6263789","source":"report@snyk.io"}]}}]}