[DepShield] (CVSS 9.8) Vulnerability due to usage of lodash:4.17.10
Opened this issue · 0 comments
Vulnerabilities
DepShield reports that this application's usage of lodash:4.17.10 results in the following vulnerability(s):
- (CVSS 9.8) [CVE-2019-10744] Versions of lodash lower than 4.17.12 are vulnerable to Prototype Pollution. The...
- (CVSS 9.8) [CVE-2018-16487] A prototype pollution vulnerability was found in lodash <4.17.11 where the funct...
- (CVSS 9.6) CWE-506: Embedded Malicious Code
- (CVSS 8.8) [NPMJS]Prototype Pollution
- (CVSS 7.4) [CVE-2020-8203] Prototype pollution attack when using _.zipObjectDeep in lodash <= 4.17.15.
- (CVSS 7.4) CWE-770: Allocation of Resources Without Limits or Throttling
- (CVSS 6.5) [CVE-2019-1010266] lodash prior to 4.17.11 is affected by: CWE-400: Uncontrolled Resource Consumpti...
Occurrences
lodash:4.17.10 is a transitive dependency introduced by the following direct dependency(s):
• standard:11.0.1
└─ eslint:4.18.2
└─ inquirer:3.3.0
└─ lodash:4.17.10
└─ lodash:4.17.10
└─ table:4.0.2
└─ lodash:4.17.10
└─ eslint-plugin-import:2.9.0
└─ lodash:4.17.10
• tmi.js:1.2.1
└─ request:2.74.0
└─ form-data:1.0.1
└─ async:2.6.1
└─ lodash:4.17.10
This is an automated GitHub Issue created by Sonatype DepShield. Details on managing GitHub Apps, including DepShield, are available for personal and organization accounts. Please submit questions or feedback about DepShield to the Sonatype DepShield Community.