Lodash versions prior to 4.17.21 are vulnerable to Command Injection via the template...
7.2CVSS
7.4AI Score
0.006EPSS
Lodash versions prior to 4.17.21 are vulnerable to Regular Expression Denial of Service (ReDoS) via the toNumber, trim and trimEnd...
5.3CVSS
6AI Score
0.002EPSS
7.4CVSS
7AI Score
0.01EPSS
Versions of lodash lower than 4.17.12 are vulnerable to Prototype Pollution. The function defaultsDeep could be tricked into adding or modifying properties of Object.prototype using a constructor...
9.1CVSS
8.9AI Score
0.015EPSS
lodash prior to 4.17.11 is affected by: CWE-400: Uncontrolled Resource Consumption. The impact is: Denial of service. The component is: Date handler. The attack vector is: Attacker provides very long strings, which the library attempts to match using a regular expression. The fixed version is:...
6.5CVSS
7.4AI Score
0.003EPSS
A prototype pollution vulnerability was found in lodash <4.17.11 where the functions merge, mergeWith, and defaultsDeep can be tricked into adding or modifying properties of...
5.6CVSS
6.3AI Score
0.001EPSS
lodash node module before 4.17.5 suffers from a Modification of Assumed-Immutable Data (MAID) vulnerability via defaultsDeep, merge, and mergeWith functions, which allows a malicious user to modify the prototype of "Object" via proto, causing the addition or modification of an existing property...
6.5CVSS
7.4AI Score
0.001EPSS