-
Notifications
You must be signed in to change notification settings - Fork 1
Open
Description
Vulnerabilities
DepShield reports that this application's usage of lodash:1.2.1 results in the following vulnerability(s):
- (CVSS 9.8) [CVE-2019-10744] Versions of lodash lower than 4.17.12 are vulnerable to Prototype Pollution. The...
- (CVSS 9.8) [CVE-2018-16487] A prototype pollution vulnerability was found in lodash <4.17.11 where the funct...
- (CVSS 9.6) CWE-506: Embedded Malicious Code
- (CVSS 8.8) [NPMJS]Prototype Pollution
- (CVSS 7.4) [CVE-2020-8203] Prototype pollution attack when using _.zipObjectDeep in lodash <= 4.17.15.
- (CVSS 7.4) CWE-770: Allocation of Resources Without Limits or Throttling
- (CVSS 7.4) CWE-471: Modification of Assumed-Immutable Data (MAID)
- (CVSS 7.2) [CVE-2021-23337] Lodash versions prior to 4.17.21 are vulnerable to Command Injection via the tem...
- (CVSS 6.5) [CVE-2019-1010266] lodash prior to 4.17.11 is affected by: CWE-400: Uncontrolled Resource Consumpti...
- (CVSS 6.5) [CVE-2018-3721] lodash node module before 4.17.5 suffers from a Modification of Assumed-Immutabl...
- (CVSS 5.3) [CVE-2020-28500] All versions of package lodash; all versions of package org.fujion.webjars:lodas...
Occurrences
lodash:1.2.1 is a transitive dependency introduced by the following direct dependency(s):
• yeoman-generator:0.13.4
└─ inquirer:0.3.5
└─ lodash:1.2.1
This is an automated GitHub Issue created by Sonatype DepShield. Details on managing GitHub Apps, including DepShield, are available for personal and organization accounts. Please submit questions or feedback about DepShield to the Sonatype DepShield Community.
Metadata
Metadata
Assignees
Labels
No labels