Yarnpkg

Yarn

7 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.02%
  • Published 21.08.2025 16:15:35
  • Last modified 12.09.2025 12:58:04

A vulnerability has been found in yarnpkg Yarn up to 1.22.22. This impacts the function setOptions of the file src/util/request-manager.js. Such manipulation leads to inefficient regular expression complexity. Local access is required to approach thi...

Exploit
  • EPSS 0.08%
  • Published 28.07.2025 07:02:05
  • Last modified 31.07.2025 19:16:47

A vulnerability was found in yarnpkg Yarn up to 1.22.22. It has been classified as problematic. Affected is the function explodeHostedGitFragment of the file src/resolvers/exotics/hosted-git-resolver.js. The manipulation leads to inefficient regular ...

  • EPSS 0.04%
  • Published 04.02.2024 20:15:45
  • Last modified 21.11.2024 06:37:43

An untrusted search path vulnerability was found in Yarn. When a victim runs certain Yarn commands in a directory with attacker-controlled content, malicious commands could be executed in unexpected ways.

Exploit
  • EPSS 0.4%
  • Published 15.03.2020 18:15:11
  • Last modified 21.11.2024 04:29:07

The package integrity validation in yarn < 1.19.0 contains a TOCTOU vulnerability where the hash is computed before writing a package to cache. It's not computed again when reading from the cache. This may lead to a cache pollution attack.

Exploit
  • EPSS 0.9%
  • Published 24.02.2020 15:15:12
  • Last modified 21.11.2024 05:38:21

Arbitrary filesystem write vulnerability in Yarn before 1.22.0 allows attackers to write to any path on the filesystem and potentially lead to arbitrary code execution by forcing the user to install a malicious package.

Exploit
  • EPSS 0.57%
  • Published 16.12.2019 20:15:14
  • Last modified 21.11.2024 04:19:53

In Yarn before 1.21.1, the package install functionality can be abused to generate arbitrary symlinks on the host filesystem by using specially crafted "bin" keys. Existing files could be overwritten depending on the current user permission set.

Exploit
  • EPSS 0.11%
  • Published 30.07.2019 21:15:11
  • Last modified 21.11.2024 04:44:57

Yarn before 1.17.3 is vulnerable to Missing Encryption of Sensitive Data due to HTTP URLs in lockfile causing unencrypted authentication data to be sent over the network.