{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-21T07:21:48.354","vulnerabilities":[{"cve":{"id":"CVE-2024-27980","sourceIdentifier":"support@hackerone.com","published":"2025-01-09T01:15:08.367","lastModified":"2026-04-15T00:35:42.020","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"Due to the improper handling of batch files in child_process.spawn / child_process.spawnSync, a malicious command line argument can inject arbitrary commands and achieve code execution even if the shell option is not enabled."},{"lang":"es","value":"Debido al gestión inadecuado de archivos por lotes en child_process.spawn / child_process.spawnSync, un argumento de línea de comandos malicioso puede inyectar comandos arbitrarios y lograr la ejecución de código incluso si la opción de shell no está habilitada."}],"metrics":{"cvssMetricV30":[{"source":"support@hackerone.com","type":"Secondary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":8.1,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.2,"impactScore":5.9}]},"weaknesses":[{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","description":[{"lang":"en","value":"CWE-77"}]}],"references":[{"url":"http://www.openwall.com/lists/oss-security/2024/04/10/15","source":"support@hackerone.com"},{"url":"http://www.openwall.com/lists/oss-security/2024/07/11/6","source":"support@hackerone.com"},{"url":"http://www.openwall.com/lists/oss-security/2024/07/19/3","source":"support@hackerone.com"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5MZN6PFXHTCCUENAKZXTGWPKUAHI6E2W/","source":"support@hackerone.com"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JUWBYDVCUSCX7YWTBX75LADMCVYFBGKU/","source":"support@hackerone.com"}]}}]}