Search Parameters:
- Contains Software Flaws (CVE)
- CPE Product Version: cpe:/a:lodash:lodash:1.0.0:rc2:~~~node.js~~
There are 4 matching records.
Vuln ID |
Summary |
CVSS Severity |
CVE-2019-10744
|
Versions of lodash lower than 4.17.12 are vulnerable to Prototype Pollution. The function defaultsDeep could be tricked into adding or modifying properties of Object.prototype using a constructor payload.
Published:
July 25, 2019; 08:15:11 PM -04:00
|
V3.0: 9.8 CRITICAL
V2: 7.5 HIGH
|
CVE-2019-1010266
|
lodash prior to 4.17.11 is affected by: CWE-400: Uncontrolled Resource Consumption. The impact is: Denial of service. The component is: Date handler. The attack vector is: Attacker provides very long strings, which the library attempts to match using a regular expression. The fixed version is: 4.17.11.
Published:
July 17, 2019; 05:15:10 PM -04:00
|
V3.0: 6.5 MEDIUM
V2: 4.0 MEDIUM
|
CVE-2018-16487
|
A prototype pollution vulnerability was found in lodash <4.17.11 where the functions merge, mergeWith, and defaultsDeep can be tricked into adding or modifying properties of Object.prototype.
Published:
February 01, 2019; 01:29:00 PM -05:00
|
V3.0: 9.8 CRITICAL
V2: 7.5 HIGH
|
CVE-2018-3721
|
lodash node module before 4.17.5 suffers from a Modification of Assumed-Immutable Data (MAID) vulnerability via defaultsDeep, merge, and mergeWith functions, which allows a malicious user to modify the prototype of "Object" via __proto__, causing the addition or modification of an existing property that will exist on all objects.
Published:
June 06, 2018; 10:29:08 PM -04:00
|
V3.0: 6.5 MEDIUM
V2: 4.0 MEDIUM
|