lodash

A modern JavaScript utility library delivering modularity, performance, & extras.

Version: 1.0.1 registry icon
Safety score
-70
Check your open source dependency risks. Get immediate insight about security, stability and licensing risks.
Security Risks of Known Vulnerabilities
CVE-2019-1010266
CWE-770
Threat level: MEDIUM | CVSS score: 6.5

lodash prior to 4.17.11 is affected by: CWE-400: Uncontrolled Resource Consumption. The impact is: Denial of service. The component is: Date handler. The attack vector is: Attacker provides very long strings, which the library attempts to match using a regular expression. The fixed version is: 4.17.11.



CVE-2020-8203
CWE-1321
Threat level: HIGH | CVSS score: 7.4

Prototype pollution attack when using _.zipObjectDeep in lodash before 4.17.20.



CVE-2018-16487
Threat level: MEDIUM | CVSS score: 5.6

A prototype pollution vulnerability was found in lodash <4.17.11 where the functions merge, mergeWith, and defaultsDeep can be tricked into adding or modifying properties of Object.prototype.



CVE-2018-3721
CWE-1321
Threat level: MEDIUM | CVSS score: 6.5

lodash node module before 4.17.5 suffers from a Modification of Assumed-Immutable Data (MAID) vulnerability via defaultsDeep, merge, and mergeWith functions, which allows a malicious user to modify the prototype of "Object" via proto, causing the addition or modification of an existing property that will exist on all objects.



CVE-2020-28500
Threat level: MEDIUM | CVSS score: 5.3

Lodash versions prior to 4.17.21 are vulnerable to Regular Expression Denial of Service (ReDoS) via the toNumber, trim and trimEnd functions.



CVE-2019-10744
CWE-1321
Threat level: HIGH | CVSS score: 9.1

Versions of lodash lower than 4.17.12 are vulnerable to Prototype Pollution. The function defaultsDeep could be tricked into adding or modifying properties of Object.prototype using a constructor payload.



Please note that this component is affected by 4 other vulnerabilities
1 Critical  |  1 High  |  2 Medium  |  0 Low  |  1 Suggest

Latest safe major: 4.17.21 Scan your application codebase with Meterian to see all known vulnerabilities in your open source software dependencies.


Stability

Stay updated with the latest patches and releases. Plan your sofware desisgn. Avoid common known vulnerabilities fixed by the open source community

Latest patch release:   1.0.2

Latest minor release:   1.3.1

Latest major release:   4.17.21

Licensing

Maintain your licence declarations and avoid unwanted licences to protect your IP the way you intended.

MIT   -   MIT License

Not a wildcard

Not proprietary

OSI Compliant