Search CVE reports


Toggle filters

1 – 10 of 14 results


CVE-2026-4800

Medium priority
Needs evaluation

Impact: The fix for CVE-2021-23337 (https://github.com/advisories/GHSA-35jh-r3h4-6jhm) added validation for the variable option in _.template but did not apply the same validation to options.imports key names. Both paths flow into...

1 affected package

node-lodash

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
node-lodash Needs evaluation Needs evaluation Needs evaluation Needs evaluation
Show less packages

CVE-2026-2950

Medium priority
Needs evaluation

Impact: Lodash versions 4.17.23 and earlier are vulnerable to prototype pollution in the _.unset and _.omit functions. The fix for (CVE-2025-13465: https://github.com/lodash/lodash/security/advisories/GHSA-xxjr-mmjv-4gpg) only...

1 affected package

node-lodash

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
node-lodash Needs evaluation Needs evaluation Needs evaluation Needs evaluation
Show less packages

CVE-2025-13465

Medium priority
Needs evaluation

Lodash versions 4.0.0 through 4.17.22 are vulnerable to prototype pollution in the _.unset and _.omit functions. An attacker can pass crafted paths which cause Lodash to delete methods from global prototypes. The issue permits...

1 affected package

node-lodash

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
node-lodash Needs evaluation Needs evaluation Needs evaluation Needs evaluation
Show less packages

CVE-2021-4472

Medium priority
Needs evaluation

The mistral-dashboard plugin for openstack has a local file inclusion vulnerability through the 'Create Workbook' feature that may result in disclosure of arbitrary local files content.

1 affected package

mistral-dashboard

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
mistral-dashboard Needs evaluation Needs evaluation Needs evaluation
Show less packages

CVE-2021-41720

Medium priority
Not affected

Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none

1 affected package

node-lodash

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
node-lodash Not affected Not affected
Show less packages

CVE-2021-23337

Medium priority
Vulnerable

Lodash versions prior to 4.17.21 are vulnerable to Command Injection via the template function.

1 affected package

node-lodash

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
node-lodash Vulnerable Vulnerable Vulnerable Vulnerable
Show less packages

CVE-2020-28500

Medium priority
Vulnerable

Lodash versions prior to 4.17.21 are vulnerable to Regular Expression Denial of Service (ReDoS) via the toNumber, trim and trimEnd functions.

1 affected package

node-lodash

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
node-lodash Vulnerable Vulnerable Vulnerable Vulnerable
Show less packages

CVE-2020-8203

Medium priority
Needs evaluation

Prototype pollution attack when using _.zipObjectDeep in lodash before 4.17.20.

1 affected package

node-lodash

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
node-lodash Needs evaluation Needs evaluation Needs evaluation Needs evaluation
Show less packages

CVE-2019-10744

Medium priority
Ignored

Versions of lodash lower than 4.17.12 are vulnerable to Prototype Pollution. The function defaultsDeep could be tricked into adding or modifying properties of Object.prototype using a constructor payload.

1 affected package

node-lodash

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
node-lodash Not affected Not affected
Show less packages

CVE-2019-1010266

Medium priority
Vulnerable

lodash prior to 4.17.11 is affected by: CWE-400: Uncontrolled Resource Consumption. The impact is: Denial of service. The component is: Date handler. The attack vector is: Attacker provides very long strings, which the library...

1 affected package

node-lodash

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
node-lodash Not affected Not affected Not affected Vulnerable
Show less packages