Search CVE reports
1 – 9 of 9 results
CVE-2021-23337
Medium priorityLodash versions prior to 4.17.21 are vulnerable to Command Injection via the template function.
1 affected package
node-lodash
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
node-lodash | Vulnerable | Vulnerable | Vulnerable | Vulnerable | Needs evaluation |
CVE-2020-28500
Medium priorityLodash versions prior to 4.17.21 are vulnerable to Regular Expression Denial of Service (ReDoS) via the toNumber, trim and trimEnd functions.
1 affected package
node-lodash
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
node-lodash | Vulnerable | Vulnerable | Vulnerable | Vulnerable | Needs evaluation |
CVE-2020-8203
Medium priorityPrototype pollution attack when using _.zipObjectDeep in lodash before 4.17.20.
1 affected package
node-lodash
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
node-lodash | Needs evaluation | Needs evaluation | Needs evaluation | Needs evaluation | Needs evaluation |
CVE-2019-10744
Medium priorityVersions of lodash lower than 4.17.12 are vulnerable to Prototype Pollution. The function defaultsDeep could be tricked into adding or modifying properties of Object.prototype using a constructor payload.
1 affected package
node-lodash
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
node-lodash | — | — | Not affected | Not affected | Not affected |
CVE-2019-1010266
Medium prioritylodash prior to 4.17.11 is affected by: CWE-400: Uncontrolled Resource Consumption. The impact is: Denial of service. The component is: Date handler. The attack vector is: Attacker provides very long strings, which the library...
1 affected package
node-lodash
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
node-lodash | Not affected | Not affected | Not affected | Vulnerable | Not affected |
CVE-2018-16487
Medium priorityA prototype pollution vulnerability was found in lodash <4.17.11 where the functions merge, mergeWith, and defaultsDeep can be tricked into adding or modifying properties of Object.prototype.
1 affected package
node-lodash
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
node-lodash | Not affected | Not affected | Not affected | Vulnerable | Vulnerable |
CVE-2018-3721
Medium prioritylodash node module before 4.17.5 suffers from a Modification of Assumed-Immutable Data (MAID) vulnerability via defaultsDeep, merge, and mergeWith functions, which allows a malicious user to modify the prototype of "Object" via...
1 affected package
node-lodash
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
node-lodash | Not affected | Not affected | Not affected | Vulnerable | Vulnerable |
CVE-2016-4972
Medium priorityOpenStack Murano before 1.0.3 (liberty) and 2.x before 2.0.1 (mitaka), Murano-dashboard before 1.0.3 (liberty) and 2.x before 2.0.1 (mitaka), and python-muranoclient before 0.7.3 (liberty) and 0.8.x before 0.8.5...
3 affected packages
murano, murano-dashboard, python-muranoclient
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
murano | Not affected | Not affected | Not affected | Not affected | Vulnerable |
murano-dashboard | Not affected | Not affected | Not affected | Not affected | Vulnerable |
python-muranoclient | Not affected | Not affected | Not affected | Not affected | Vulnerable |
CVE-2009-0854
High priorityUntrusted search path vulnerability in dash 0.5.4, when used as a login shell, allows local users to execute arbitrary code via a Trojan horse .profile file in the current working directory.
1 affected package
dash
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
dash | — | — | — | — | — |