We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? # for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “#”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? # to your account
Lodash modular utilities.
Library home page: https://registry.npmjs.org/lodash/-/lodash-4.17.11.tgz
Path to dependency file: /docs/package.json
Path to vulnerable library: /docs/node_modules/lodash/package.json
Dependency Hierarchy:
Library home page: https://registry.npmjs.org/lodash/-/lodash-4.17.10.tgz
Path to vulnerable library: /docs/node_modules/gulp-uglify/node_modules/lodash/package.json
Found in HEAD commit: 4d038f6521e1205e037211e7c3dcc92a82448d22
Found in base branch: master
Lodash versions prior to 4.17.21 are vulnerable to Command Injection via the template function.
Publish Date: 2021-02-15
URL: CVE-2021-23337
Base Score Metrics:
Type: Upgrade version
Origin: lodash/lodash@3469357
Release Date: 2021-02-15
Fix Resolution (lodash): 4.17.21
Direct dependency fix Resolution (browser-sync): 2.26.4
Direct dependency fix Resolution (gulp-uglify): 3.0.2
⛑️ Automatic Remediation is available for this issue
The text was updated successfully, but these errors were encountered:
No branches or pull requests
CVE-2021-23337 - High Severity Vulnerability
lodash-4.17.11.tgz
Lodash modular utilities.
Library home page: https://registry.npmjs.org/lodash/-/lodash-4.17.11.tgz
Path to dependency file: /docs/package.json
Path to vulnerable library: /docs/node_modules/lodash/package.json
Dependency Hierarchy:
lodash-4.17.10.tgz
Lodash modular utilities.
Library home page: https://registry.npmjs.org/lodash/-/lodash-4.17.10.tgz
Path to dependency file: /docs/package.json
Path to vulnerable library: /docs/node_modules/gulp-uglify/node_modules/lodash/package.json
Dependency Hierarchy:
Found in HEAD commit: 4d038f6521e1205e037211e7c3dcc92a82448d22
Found in base branch: master
Lodash versions prior to 4.17.21 are vulnerable to Command Injection via the template function.
Publish Date: 2021-02-15
URL: CVE-2021-23337
Base Score Metrics:
Type: Upgrade version
Origin: lodash/lodash@3469357
Release Date: 2021-02-15
Fix Resolution (lodash): 4.17.21
Direct dependency fix Resolution (browser-sync): 2.26.4
Fix Resolution (lodash): 4.17.21
Direct dependency fix Resolution (gulp-uglify): 3.0.2
⛑️ Automatic Remediation is available for this issue
The text was updated successfully, but these errors were encountered: