chart-tool
chart-tool copied to clipboard
[DepShield] (CVSS 9.8) Vulnerability due to usage of lodash:3.10.1
Vulnerabilities
DepShield reports that this application's usage of lodash:3.10.1 results in the following vulnerability(s):
- (CVSS 9.8) CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection')
- (CVSS 9.8) [CVE-2019-10744] Versions of lodash lower than 4.17.12 are vulnerable to Prototype Pollution. The...
- (CVSS 9.8) [CVE-2018-16487] A prototype pollution vulnerability was found in lodash <4.17.11 where the funct...
- (CVSS 9.6) CWE-506: Embedded Malicious Code
- (CVSS 8.8) [NPMJS]Prototype Pollution
- (CVSS 7.4) [CVE-2020-8203] Prototype pollution attack when using _.zipObjectDeep in lodash <= 4.17.15.
- (CVSS 7.4) CWE-770: Allocation of Resources Without Limits or Throttling
- (CVSS 7.4) CWE-471: Modification of Assumed-Immutable Data (MAID)
- (CVSS 7.2) [CVE-2021-23337] Lodash versions prior to 4.17.21 are vulnerable to Command Injection via the tem...
- (CVSS 6.5) [CVE-2019-1010266] lodash prior to 4.17.11 is affected by: CWE-400: Uncontrolled Resource Consumpti...
- (CVSS 6.5) [CVE-2018-3721] lodash node module before 4.17.5 suffers from a Modification of Assumed-Immutabl...
- (CVSS 5.3) [CVE-2020-28500] All versions of package lodash; all versions of package org.fujion.webjars:lodas...
Occurrences
lodash:3.10.1 is a transitive dependency introduced by the following direct dependency(s):
• browser-sync:2.24.5 └─ easy-extender:2.3.2 └─ lodash:3.10.1
This is an automated GitHub Issue created by Sonatype DepShield. Details on managing GitHub Apps, including DepShield, are available for personal and organization accounts. Please submit questions or feedback about DepShield to the Sonatype DepShield Community.