lodash/lodash on GitHub
A modern JavaScript utility library delivering modularity, performance, & extras.
CVE History
CVE | Published | CVSS v2 | CVSS v3 |
---|---|---|---|
CVE-2021-23337 | 7.2 HIGH | 6.5 MEDIUM | |
Lodash versions prior to 4.17.21 are vulnerable to Command Injection via the template function. | |||
CVE-2020-28500 | 5.3 MEDIUM | 5 MEDIUM | |
Lodash versions prior to 4.17.21 are vulnerable to Regular Expression Denial of Service (ReDoS) via the toNumber, trim and trimEnd functions. | |||
CVE-2020-8203 | 7.4 HIGH | 5.8 MEDIUM | |
Prototype pollution attack when using _.zipObjectDeep in lodash before 4.17.20. | |||
CVE-2019-1010266 | 6.5 MEDIUM | 4 MEDIUM | |
lodash prior to 4.17.11 is affected by: CWE-400: Uncontrolled Resource Consumption. The impact is: Denial of service. The component is: Date handler. The attack vector is: Attacker provides very long strings, which the library attempts to match using a regular expression. The fixed version is: 4.17.11. | |||
CVE-2018-3721 | 6.5 MEDIUM | 4 MEDIUM | |
lodash node module before 4.17.5 suffers from a Modification of Assumed-Immutable Data (MAID) vulnerability via defaultsDeep, merge, and mergeWith functions, which allows a malicious user to modify the prototype of "Object" via __proto__, causing the addition or modification of an existing property that will exist on all objects. |