Lodash

Lodash

8 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.06%
  • Veröffentlicht 21.01.2026 19:05:28
  • Zuletzt bearbeitet 26.01.2026 15:04:59

Lodash versions 4.0.0 through 4.17.22 are vulnerable to prototype pollution in the _.unset and _.omit functions. An attacker can pass crafted paths which cause Lodash to delete methods from global prototypes. The issue permits deletion of properties...

Exploit
  • EPSS 0.74%
  • Veröffentlicht 15.02.2021 13:15:12
  • Zuletzt bearbeitet 21.11.2024 05:51:31

Lodash versions prior to 4.17.21 are vulnerable to Command Injection via the template function.

Exploit
  • EPSS 0.25%
  • Veröffentlicht 15.02.2021 11:15:12
  • Zuletzt bearbeitet 21.11.2024 05:22:55

Lodash versions prior to 4.17.21 are vulnerable to Regular Expression Denial of Service (ReDoS) via the toNumber, trim and trimEnd functions.

Exploit
  • EPSS 2.62%
  • Veröffentlicht 15.07.2020 17:15:11
  • Zuletzt bearbeitet 21.11.2024 05:38:29

Prototype pollution attack when using _.zipObjectDeep in lodash before 4.17.20.

Exploit
  • EPSS 2.44%
  • Veröffentlicht 26.07.2019 00:15:11
  • Zuletzt bearbeitet 21.11.2024 04:19:50

Versions of lodash lower than 4.17.12 are vulnerable to Prototype Pollution. The function defaultsDeep could be tricked into adding or modifying properties of Object.prototype using a constructor payload.

Exploit
  • EPSS 0.21%
  • Veröffentlicht 17.07.2019 21:15:10
  • Zuletzt bearbeitet 21.11.2024 04:18:06

lodash prior to 4.17.11 is affected by: CWE-400: Uncontrolled Resource Consumption. The impact is: Denial of service. The component is: Date handler. The attack vector is: Attacker provides very long strings, which the library attempts to match using...

Exploit
  • EPSS 0.4%
  • Veröffentlicht 01.02.2019 18:29:00
  • Zuletzt bearbeitet 21.11.2024 03:52:51

A prototype pollution vulnerability was found in lodash <4.17.11 where the functions merge, mergeWith, and defaultsDeep can be tricked into adding or modifying properties of Object.prototype.

Exploit
  • EPSS 0.17%
  • Veröffentlicht 07.06.2018 02:29:08
  • Zuletzt bearbeitet 21.11.2024 04:05:56

lodash node module before 4.17.5 suffers from a Modification of Assumed-Immutable Data (MAID) vulnerability via defaultsDeep, merge, and mergeWith functions, which allows a malicious user to modify the prototype of "Object" via __proto__, causing the...