NodeJS/lodash/0.2.0
Lodash modular utilities.
Repo Link:
https://www.npmjs.com/package/lodash
License:
MIT
9 Security Vulnerabilities
Published date: 2022-01-06T20:30:46Z
CVE: CVE-2020-28500
All versions of package lodash prior to 4.17.21 are vulnerable to Regular Expression Denial of Service (ReDoS) via the toNumber
, trim
and trimEnd
functions.
Steps to reproduce (provided by reporter Liyuan Chen):
```js
var lo = require('lodash');
function buildblank(n) {
var ret = 1
for (var i = 0; i < n; i++) {
ret += "
}
return ret + 1";
}
var s = build blank(50000) var time0 = Date.now();
lo.trim(s)
var timecost0 = Date.now() - time0;
console.log("time cost0: + time_cost0);
var time1 = Date.now();
lo.toNumber(s) var time_cost1 = Date.now() - time1;
console.log( timecost1: " + time cost1);
var time2 = Date.now();
lo.trimEnd(s);
var timecost2 = Date.now() - time2;
console.log("time cost2: " + time_cost2);
```
Affected versions:
["0.1.0", "0.2.0", "0.2.1", "0.3.0", "0.3.1", "0.4.0", "0.4.2", "0.5.0-rc.1", "0.5.0", "0.5.1", "0.5.2", "0.2.2", "0.3.2", "0.4.1", "0.6.0", "0.7.0", "0.8.1", "0.8.2", "0.9.0", "0.9.1", "0.9.2", "0.10.0", "1.0.0-rc.1", "1.0.0", "1.1.0", "1.1.1", "1.3.0", "1.3.1", "2.0.0", "2.1.0", "2.2.1", "2.4.0", "3.0.1", "3.1.0", "3.3.1", "3.4.0", "3.6.0", "3.8.0", "3.9.2", "3.9.3", "3.10.0", "4.0.0", "4.1.0", "4.2.0", "4.2.1", "4.4.0", "4.5.0", "4.5.1", "4.6.0", "4.7.0", "4.10.0", "4.11.1", "4.13.1", "4.14.1", "4.14.2", "4.16.5", "4.16.6", "4.17.2", "4.17.3", "4.17.4", "4.17.5", "4.17.13", "4.17.17", "4.17.19", "4.17.20", "0.6.1", "0.8.0", "1.0.0-rc.2", "1.0.0-rc.3", "1.0.1", "1.2.0", "1.2.1", "2.2.0", "2.3.0", "2.4.1", "3.0.0", "3.2.0", "3.3.0", "3.5.0", "1.0.2", "3.7.0", "2.4.2", "3.9.0", "3.9.1", "3.10.1", "4.0.1", "4.3.0", "4.6.1", "4.8.0", "4.8.1", "4.8.2", "4.9.0", "4.11.0", "4.11.2", "4.12.0", "4.13.0", "4.14.0", "4.15.0", "4.16.0", "4.16.1", "4.16.2", "4.16.3", "4.16.4", "4.17.0", "4.17.1", "4.17.9", "4.17.10", "4.17.11", "4.17.12", "4.17.14", "4.17.15", "4.17.16", "4.17.18"]
Secure versions:
[]
Published date: 2021-05-06T16:05:51Z
CVE: CVE-2021-23337
lodash
versions prior to 4.17.21 are vulnerable to Command Injection via the template function.
Affected versions:
["0.1.0", "0.2.0", "0.2.1", "0.3.0", "0.3.1", "0.4.0", "0.4.2", "0.5.0-rc.1", "0.5.0", "0.5.1", "0.5.2", "0.2.2", "0.3.2", "0.4.1", "0.6.0", "0.7.0", "0.8.1", "0.8.2", "0.9.0", "0.9.1", "0.9.2", "0.10.0", "1.0.0-rc.1", "1.0.0", "1.1.0", "1.1.1", "1.3.0", "1.3.1", "2.0.0", "2.1.0", "2.2.1", "2.4.0", "3.0.1", "3.1.0", "3.3.1", "3.4.0", "3.6.0", "3.8.0", "3.9.2", "3.9.3", "3.10.0", "4.0.0", "4.1.0", "4.2.0", "4.2.1", "4.4.0", "4.5.0", "4.5.1", "4.6.0", "4.7.0", "4.10.0", "4.11.1", "4.13.1", "4.14.1", "4.14.2", "4.16.5", "4.16.6", "4.17.2", "4.17.3", "4.17.4", "4.17.5", "4.17.13", "4.17.17", "4.17.19", "4.17.20", "0.6.1", "0.8.0", "1.0.0-rc.2", "1.0.0-rc.3", "1.0.1", "1.2.0", "1.2.1", "2.2.0", "2.3.0", "2.4.1", "3.0.0", "3.2.0", "3.3.0", "3.5.0", "1.0.2", "3.7.0", "2.4.2", "3.9.0", "3.9.1", "3.10.1", "4.0.1", "4.3.0", "4.6.1", "4.8.0", "4.8.1", "4.8.2", "4.9.0", "4.11.0", "4.11.2", "4.12.0", "4.13.0", "4.14.0", "4.15.0", "4.16.0", "4.16.1", "4.16.2", "4.16.3", "4.16.4", "4.17.0", "4.17.1", "4.17.9", "4.17.10", "4.17.11", "4.17.12", "4.17.14", "4.17.15", "4.17.16", "4.17.18"]
Secure versions:
[]
Published date: 2019-02-07T18:16:48Z
CVE: CVE-2018-16487
Versions of lodash
before 4.17.11 are vulnerable to prototype pollution.
The vulnerable functions are 'defaultsDeep', 'merge', and 'mergeWith' which allow a malicious user to modify the prototype of Object
via {constructor: {prototype: {...}}}
causing the addition or modification of an existing property that will exist on all objects.
Recommendation
Update to version 4.17.11 or later.
Affected versions:
["0.1.0", "0.2.0", "0.2.1", "0.3.0", "0.3.1", "0.4.0", "0.4.2", "0.5.0-rc.1", "0.5.0", "0.5.1", "0.5.2", "0.2.2", "0.3.2", "0.4.1", "0.6.0", "0.7.0", "0.8.1", "0.8.2", "0.9.0", "0.9.1", "0.9.2", "0.10.0", "1.0.0-rc.1", "1.0.0", "1.1.0", "1.1.1", "1.3.0", "1.3.1", "2.0.0", "2.1.0", "2.2.1", "2.4.0", "3.0.1", "3.1.0", "3.3.1", "3.4.0", "3.6.0", "3.8.0", "3.9.2", "3.9.3", "3.10.0", "4.0.0", "4.1.0", "4.2.0", "4.2.1", "4.4.0", "4.5.0", "4.5.1", "4.6.0", "4.7.0", "4.10.0", "4.11.1", "4.13.1", "4.14.1", "4.14.2", "4.16.5", "4.16.6", "4.17.2", "4.17.3", "4.17.4", "4.17.5", "0.6.1", "0.8.0", "1.0.0-rc.2", "1.0.0-rc.3", "1.0.1", "1.2.0", "1.2.1", "2.2.0", "2.3.0", "2.4.1", "3.0.0", "3.2.0", "3.3.0", "3.5.0", "1.0.2", "3.7.0", "2.4.2", "3.9.0", "3.9.1", "3.10.1", "4.0.1", "4.3.0", "4.6.1", "4.8.0", "4.8.1", "4.8.2", "4.9.0", "4.11.0", "4.11.2", "4.12.0", "4.13.0", "4.14.0", "4.15.0", "4.16.0", "4.16.1", "4.16.2", "4.16.3", "4.16.4", "4.17.0", "4.17.1", "4.17.9", "4.17.10"]
Secure versions:
[]
Published date: 2021-12-03T20:37:32Z
CVE: CVE-2021-41720
Withdrawn
GitHub has chosen to publish this CVE as a withdrawn advisory due to it not being a security issue. See this issue for more details.
CVE description
"** DISPUTED ** A command injection vulnerability in Lodash 4.17.21 allows attackers to achieve arbitrary code execution via the template function. This is a different parameter, method, and version than CVE-2021-23337. NOTE: the vendor's position is that it's the developer's responsibility to ensure that a template does not evaluate code that originates from untrusted input.
Affected versions:
["0.1.0", "0.2.0", "0.2.1", "0.2.2", "0.3.0", "0.3.1", "0.3.2", "0.4.0", "0.4.1", "0.4.2", "0.5.0-rc.1", "0.5.0", "0.5.1", "0.5.2", "0.6.0", "0.6.1", "0.7.0", "0.8.0", "0.8.1", "0.8.2", "0.9.0", "0.9.1", "0.9.2", "0.10.0", "1.0.0-rc.1", "1.0.0-rc.2", "1.0.0-rc.3", "1.0.0", "1.0.1", "1.1.0", "1.1.1", "1.2.0", "1.2.1", "1.3.0", "1.3.1", "2.0.0", "2.1.0", "2.2.0", "2.2.1", "2.3.0", "2.4.0", "2.4.1", "3.0.0", "3.0.1", "3.1.0", "3.2.0", "3.3.0", "3.3.1", "3.4.0", "3.5.0", "3.6.0", "1.0.2", "3.7.0", "2.4.2", "3.8.0", "3.9.0", "3.9.1", "3.9.2", "3.9.3", "3.10.0", "3.10.1", "4.0.0", "4.0.1", "4.1.0", "4.2.0", "4.2.1", "4.3.0", "4.4.0", "4.5.0", "4.5.1", "4.6.0", "4.6.1", "4.7.0", "4.8.0", "4.8.1", "4.8.2", "4.9.0", "4.10.0", "4.11.0", "4.11.1", "4.11.2", "4.12.0", "4.13.0", "4.13.1", "4.14.0", "4.14.1", "4.14.2", "4.15.0", "4.16.0", "4.16.1", "4.16.2", "4.16.3", "4.16.4", "4.16.5", "4.16.6", "4.17.0", "4.17.1", "4.17.2", "4.17.3", "4.17.4", "4.17.5", "4.17.9", "4.17.10", "4.17.11", "4.17.12", "4.17.13", "4.17.14", "4.17.15", "4.17.16", "4.17.17", "4.17.18", "4.17.19", "4.17.20", "4.17.21"]
Secure versions:
[]
Published date: 2018-07-26T15:14:52Z
CVE: CVE-2018-3721
Versions of lodash
before 4.17.5 are vulnerable to prototype pollution.
The vulnerable functions are 'defaultsDeep', 'merge', and 'mergeWith' which allow a malicious user to modify the prototype of Object
via __proto__
causing the addition or modification of an existing property that will exist on all objects.
Recommendation
Update to version 4.17.5 or later.
Affected versions:
["0.1.0", "0.2.0", "0.2.1", "0.3.0", "0.3.1", "0.4.0", "0.4.2", "0.5.0-rc.1", "0.5.0", "0.5.1", "0.5.2", "0.2.2", "0.3.2", "0.4.1", "0.6.0", "0.7.0", "0.8.1", "0.8.2", "0.9.0", "0.9.1", "0.9.2", "0.10.0", "1.0.0-rc.1", "1.0.0", "1.1.0", "1.1.1", "1.3.0", "1.3.1", "2.0.0", "2.1.0", "2.2.1", "2.4.0", "3.0.1", "3.1.0", "3.3.1", "3.4.0", "3.6.0", "3.8.0", "3.9.2", "3.9.3", "3.10.0", "4.0.0", "4.1.0", "4.2.0", "4.2.1", "4.4.0", "4.5.0", "4.5.1", "4.6.0", "4.7.0", "4.10.0", "4.11.1", "4.13.1", "4.14.1", "4.14.2", "4.16.5", "4.16.6", "4.17.2", "4.17.3", "4.17.4", "0.6.1", "0.8.0", "1.0.0-rc.2", "1.0.0-rc.3", "1.0.1", "1.2.0", "1.2.1", "2.2.0", "2.3.0", "2.4.1", "3.0.0", "3.2.0", "3.3.0", "3.5.0", "1.0.2", "3.7.0", "2.4.2", "3.9.0", "3.9.1", "3.10.1", "4.0.1", "4.3.0", "4.6.1", "4.8.0", "4.8.1", "4.8.2", "4.9.0", "4.11.0", "4.11.2", "4.12.0", "4.13.0", "4.14.0", "4.15.0", "4.16.0", "4.16.1", "4.16.2", "4.16.3", "4.16.4", "4.17.0", "4.17.1"]
Secure versions:
[]
Published date: 2019-07-10T19:45:23Z
CVE: CVE-2019-10744
Versions of lodash
before 4.17.12 are vulnerable to Prototype Pollution. The function defaultsDeep
allows a malicious user to modify the prototype of Object
via {constructor: {prototype: {...}}}
causing the addition or modification of an existing property that will exist on all objects.
Recommendation
Update to version 4.17.12 or later.
Affected versions:
["0.1.0", "0.2.0", "0.2.1", "0.3.0", "0.3.1", "0.4.0", "0.4.2", "0.5.0-rc.1", "0.5.0", "0.5.1", "0.5.2", "0.2.2", "0.3.2", "0.4.1", "0.6.0", "0.7.0", "0.8.1", "0.8.2", "0.9.0", "0.9.1", "0.9.2", "0.10.0", "1.0.0-rc.1", "1.0.0", "1.1.0", "1.1.1", "1.3.0", "1.3.1", "2.0.0", "2.1.0", "2.2.1", "2.4.0", "3.0.1", "3.1.0", "3.3.1", "3.4.0", "3.6.0", "3.8.0", "3.9.2", "3.9.3", "3.10.0", "4.0.0", "4.1.0", "4.2.0", "4.2.1", "4.4.0", "4.5.0", "4.5.1", "4.6.0", "4.7.0", "4.10.0", "4.11.1", "4.13.1", "4.14.1", "4.14.2", "4.16.5", "4.16.6", "4.17.2", "4.17.3", "4.17.4", "4.17.5", "0.6.1", "0.8.0", "1.0.0-rc.2", "1.0.0-rc.3", "1.0.1", "1.2.0", "1.2.1", "2.2.0", "2.3.0", "2.4.1", "3.0.0", "3.2.0", "3.3.0", "3.5.0", "1.0.2", "3.7.0", "2.4.2", "3.9.0", "3.9.1", "3.10.1", "4.0.1", "4.3.0", "4.6.1", "4.8.0", "4.8.1", "4.8.2", "4.9.0", "4.11.0", "4.11.2", "4.12.0", "4.13.0", "4.14.0", "4.15.0", "4.16.0", "4.16.1", "4.16.2", "4.16.3", "4.16.4", "4.17.0", "4.17.1", "4.17.9", "4.17.10", "4.17.11"]
Secure versions:
[]
Published date: 2019-07-19T16:13:07Z
CVE: CVE-2019-1010266
lodash prior to 4.7.11 is affected by: CWE-400: Uncontrolled Resource Consumption. The impact is: Denial of service. The component is: Date handler. The attack vector is: Attacker provides very long strings, which the library attempts to match using a regular expression. The fixed version is: 4.7.11.
Affected versions:
["0.1.0", "0.2.0", "0.2.1", "0.3.0", "0.3.1", "0.4.0", "0.4.2", "0.5.0-rc.1", "0.5.0", "0.5.1", "0.5.2", "0.2.2", "0.3.2", "0.4.1", "0.6.0", "0.7.0", "0.8.1", "0.8.2", "0.9.0", "0.9.1", "0.9.2", "0.10.0", "1.0.0-rc.1", "1.0.0", "1.1.0", "1.1.1", "1.3.0", "1.3.1", "2.0.0", "2.1.0", "2.2.1", "2.4.0", "3.0.1", "3.1.0", "3.3.1", "3.4.0", "3.6.0", "3.8.0", "3.9.2", "3.9.3", "3.10.0", "4.0.0", "4.1.0", "4.2.0", "4.2.1", "4.4.0", "4.5.0", "4.5.1", "4.6.0", "4.7.0", "4.10.0", "4.11.1", "4.13.1", "4.14.1", "4.14.2", "4.16.5", "4.16.6", "4.17.2", "4.17.3", "4.17.4", "4.17.5", "0.6.1", "0.8.0", "1.0.0-rc.2", "1.0.0-rc.3", "1.0.1", "1.2.0", "1.2.1", "2.2.0", "2.3.0", "2.4.1", "3.0.0", "3.2.0", "3.3.0", "3.5.0", "1.0.2", "3.7.0", "2.4.2", "3.9.0", "3.9.1", "3.10.1", "4.0.1", "4.3.0", "4.6.1", "4.8.0", "4.8.1", "4.8.2", "4.9.0", "4.11.0", "4.11.2", "4.12.0", "4.13.0", "4.14.0", "4.15.0", "4.16.0", "4.16.1", "4.16.2", "4.16.3", "4.16.4", "4.17.0", "4.17.1", "4.17.9", "4.17.10"]
Secure versions:
[]
Published date: 2018-02-12
CVEs: ["CVE-2018-3721"]
CVSS Score: 2.5
CVSS Vector: CVSS:3.0/AV:L/AC:H/PR:H/UI:R/S:U/C:N/I:N/A:L
lodash node module before 4.17.5 suffers from a prototype pollution vulnerability via 'defaultsDeep', 'merge', and 'mergeWith' functions, which allows a malicious user to modify the prototype of 'Object' via proto , causing the addition or modification of an existing property that will exist on all objects.
Affected versions:
["0.1.0", "0.2.0", "0.2.1", "0.2.2", "0.3.0", "0.3.1", "0.3.2", "0.4.0", "0.4.1", "0.4.2", "0.5.0-rc.1", "0.5.0", "0.5.1", "0.5.2", "0.6.0", "0.6.1", "0.7.0", "0.8.0", "0.8.1", "0.8.2", "0.9.0", "0.9.1", "0.9.2", "0.10.0", "1.0.0-rc.1", "1.0.0-rc.2", "1.0.0-rc.3", "1.0.0", "1.0.1", "1.1.0", "1.1.1", "1.2.0", "1.2.1", "1.3.0", "1.3.1", "2.0.0", "2.1.0", "2.2.0", "2.2.1", "2.3.0", "2.4.0", "2.4.1", "3.0.0", "3.0.1", "3.1.0", "3.2.0", "3.3.0", "3.3.1", "3.4.0", "3.5.0", "3.6.0", "1.0.2", "3.7.0", "2.4.2", "3.8.0", "3.9.0", "3.9.1", "3.9.2", "3.9.3", "3.10.0", "3.10.1", "4.0.0", "4.0.1", "4.1.0", "4.2.0", "4.2.1", "4.3.0", "4.4.0", "4.5.0", "4.5.1", "4.6.0", "4.6.1", "4.7.0", "4.8.0", "4.8.1", "4.8.2", "4.9.0", "4.10.0", "4.11.0", "4.11.1", "4.11.2", "4.12.0", "4.13.0", "4.13.1", "4.14.0", "4.14.1", "4.14.2", "4.15.0", "4.16.0", "4.16.1", "4.16.2", "4.16.3", "4.16.4", "4.16.5", "4.16.6", "4.17.0", "4.17.1", "4.17.2", "4.17.3", "4.17.4", "NodeJS/lodash/0.1.0", "NodeJS/lodash/0.2.0", "NodeJS/lodash/0.2.1", "NodeJS/lodash/0.3.0", "NodeJS/lodash/0.3.1", "NodeJS/lodash/0.4.0", "NodeJS/lodash/0.4.2", "NodeJS/lodash/0.5.0-rc.1", "NodeJS/lodash/0.5.0", "NodeJS/lodash/0.5.1", "NodeJS/lodash/0.5.2", "NodeJS/lodash/0.2.2", "NodeJS/lodash/0.3.2", "NodeJS/lodash/0.4.1", "NodeJS/lodash/0.6.0", "NodeJS/lodash/0.7.0", "NodeJS/lodash/0.8.1", "NodeJS/lodash/0.8.2", "NodeJS/lodash/0.9.0", "NodeJS/lodash/0.9.1", "NodeJS/lodash/0.9.2", "NodeJS/lodash/0.10.0", "NodeJS/lodash/1.0.0-rc.1", "NodeJS/lodash/1.0.0", "NodeJS/lodash/1.1.0", "NodeJS/lodash/1.1.1", "NodeJS/lodash/1.3.0", "NodeJS/lodash/1.3.1", "NodeJS/lodash/2.0.0", "NodeJS/lodash/2.1.0", "NodeJS/lodash/2.2.1", "NodeJS/lodash/2.4.0", "NodeJS/lodash/3.0.1", "NodeJS/lodash/3.1.0", "NodeJS/lodash/3.3.1", "NodeJS/lodash/3.4.0", "NodeJS/lodash/3.6.0", "NodeJS/lodash/3.8.0", "NodeJS/lodash/3.9.2", "NodeJS/lodash/3.9.3", "NodeJS/lodash/3.10.0", "NodeJS/lodash/4.0.0", "NodeJS/lodash/4.1.0", "NodeJS/lodash/4.2.0", "NodeJS/lodash/4.2.1", "NodeJS/lodash/4.4.0", "NodeJS/lodash/4.5.0", "NodeJS/lodash/4.5.1", "NodeJS/lodash/4.6.0", "NodeJS/lodash/4.7.0", "NodeJS/lodash/4.10.0", "NodeJS/lodash/4.11.1", "NodeJS/lodash/4.13.1", "NodeJS/lodash/4.14.1", "NodeJS/lodash/4.14.2", "NodeJS/lodash/4.16.5", "NodeJS/lodash/4.16.6", "NodeJS/lodash/4.17.2", "NodeJS/lodash/4.17.3", "NodeJS/lodash/4.17.4", "NodeJS/lodash/0.6.1", "NodeJS/lodash/0.8.0", "NodeJS/lodash/1.0.0-rc.2", "NodeJS/lodash/1.0.0-rc.3", "NodeJS/lodash/1.0.1", "NodeJS/lodash/1.2.0", "NodeJS/lodash/1.2.1", "NodeJS/lodash/2.2.0", "NodeJS/lodash/2.3.0", "NodeJS/lodash/2.4.1", "NodeJS/lodash/3.0.0", "NodeJS/lodash/3.2.0", "NodeJS/lodash/3.3.0", "NodeJS/lodash/3.5.0", "NodeJS/lodash/1.0.2", "NodeJS/lodash/3.7.0", "NodeJS/lodash/2.4.2", "NodeJS/lodash/3.9.0", "NodeJS/lodash/3.9.1", "NodeJS/lodash/3.10.1", "NodeJS/lodash/4.0.1", "NodeJS/lodash/4.3.0", "NodeJS/lodash/4.6.1", "NodeJS/lodash/4.8.0", "NodeJS/lodash/4.8.1", "NodeJS/lodash/4.8.2", "NodeJS/lodash/4.9.0", "NodeJS/lodash/4.11.0", "NodeJS/lodash/4.11.2", "NodeJS/lodash/4.12.0", "NodeJS/lodash/4.13.0", "NodeJS/lodash/4.14.0", "NodeJS/lodash/4.15.0", "NodeJS/lodash/4.16.0", "NodeJS/lodash/4.16.1", "NodeJS/lodash/4.16.2", "NodeJS/lodash/4.16.3", "NodeJS/lodash/4.16.4", "NodeJS/lodash/4.17.0", "NodeJS/lodash/4.17.1"]
Secure versions:
[]
Recommendation:
Update module to 4.17.5 or higher
Published date: 2018-10-30
CVEs: ["CVE-2018-16487"]
CVSS Score: 7.0
CVSS Vector: CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N
Prototype pollution attack (lodash / constructor.prototype)
Affected versions:
["0.1.0", "0.2.0", "0.2.1", "0.2.2", "0.3.0", "0.3.1", "0.3.2", "0.4.0", "0.4.1", "0.4.2", "0.5.0-rc.1", "0.5.0", "0.5.1", "0.5.2", "0.6.0", "0.6.1", "0.7.0", "0.8.0", "0.8.1", "0.8.2", "0.9.0", "0.9.1", "0.9.2", "0.10.0", "1.0.0-rc.1", "1.0.0-rc.2", "1.0.0-rc.3", "1.0.0", "1.0.1", "1.1.0", "1.1.1", "1.2.0", "1.2.1", "1.3.0", "1.3.1", "2.0.0", "2.1.0", "2.2.0", "2.2.1", "2.3.0", "2.4.0", "2.4.1", "3.0.0", "3.0.1", "3.1.0", "3.2.0", "3.3.0", "3.3.1", "3.4.0", "3.5.0", "3.6.0", "1.0.2", "3.7.0", "2.4.2", "3.8.0", "3.9.0", "3.9.1", "3.9.2", "3.9.3", "3.10.0", "3.10.1", "4.0.0", "4.0.1", "4.1.0", "4.2.0", "4.2.1", "4.3.0", "4.4.0", "4.5.0", "4.5.1", "4.6.0", "4.6.1", "4.7.0", "4.8.0", "4.8.1", "4.8.2", "4.9.0", "4.10.0", "4.11.0", "4.11.1", "4.11.2", "4.12.0", "4.13.0", "4.13.1", "4.14.0", "4.14.1", "4.14.2", "4.15.0", "4.16.0", "4.16.1", "4.16.2", "4.16.3", "4.16.4", "4.16.5", "4.16.6", "4.17.0", "4.17.1", "4.17.2", "4.17.3", "4.17.4", "4.17.5", "4.17.9", "4.17.10", "NodeJS/lodash/0.1.0", "NodeJS/lodash/0.2.0", "NodeJS/lodash/0.2.1", "NodeJS/lodash/0.3.0", "NodeJS/lodash/0.3.1", "NodeJS/lodash/0.4.0", "NodeJS/lodash/0.4.2", "NodeJS/lodash/0.5.0-rc.1", "NodeJS/lodash/0.5.0", "NodeJS/lodash/0.5.1", "NodeJS/lodash/0.5.2", "NodeJS/lodash/0.2.2", "NodeJS/lodash/0.3.2", "NodeJS/lodash/0.4.1", "NodeJS/lodash/0.6.0", "NodeJS/lodash/0.7.0", "NodeJS/lodash/0.8.1", "NodeJS/lodash/0.8.2", "NodeJS/lodash/0.9.0", "NodeJS/lodash/0.9.1", "NodeJS/lodash/0.9.2", "NodeJS/lodash/0.10.0", "NodeJS/lodash/1.0.0-rc.1", "NodeJS/lodash/1.0.0", "NodeJS/lodash/1.1.0", "NodeJS/lodash/1.1.1", "NodeJS/lodash/1.3.0", "NodeJS/lodash/1.3.1", "NodeJS/lodash/2.0.0", "NodeJS/lodash/2.1.0", "NodeJS/lodash/2.2.1", "NodeJS/lodash/2.4.0", "NodeJS/lodash/3.0.1", "NodeJS/lodash/3.1.0", "NodeJS/lodash/3.3.1", "NodeJS/lodash/3.4.0", "NodeJS/lodash/3.6.0", "NodeJS/lodash/3.8.0", "NodeJS/lodash/3.9.2", "NodeJS/lodash/3.9.3", "NodeJS/lodash/3.10.0", "NodeJS/lodash/4.0.0", "NodeJS/lodash/4.1.0", "NodeJS/lodash/4.2.0", "NodeJS/lodash/4.2.1", "NodeJS/lodash/4.4.0", "NodeJS/lodash/4.5.0", "NodeJS/lodash/4.5.1", "NodeJS/lodash/4.6.0", "NodeJS/lodash/4.7.0", "NodeJS/lodash/4.10.0", "NodeJS/lodash/4.11.1", "NodeJS/lodash/4.13.1", "NodeJS/lodash/4.14.1", "NodeJS/lodash/4.14.2", "NodeJS/lodash/4.16.5", "NodeJS/lodash/4.16.6", "NodeJS/lodash/4.17.2", "NodeJS/lodash/4.17.3", "NodeJS/lodash/4.17.4", "NodeJS/lodash/4.17.5", "NodeJS/lodash/0.6.1", "NodeJS/lodash/0.8.0", "NodeJS/lodash/1.0.0-rc.2", "NodeJS/lodash/1.0.0-rc.3", "NodeJS/lodash/1.0.1", "NodeJS/lodash/1.2.0", "NodeJS/lodash/1.2.1", "NodeJS/lodash/2.2.0", "NodeJS/lodash/2.3.0", "NodeJS/lodash/2.4.1", "NodeJS/lodash/3.0.0", "NodeJS/lodash/3.2.0", "NodeJS/lodash/3.3.0", "NodeJS/lodash/3.5.0", "NodeJS/lodash/1.0.2", "NodeJS/lodash/3.7.0", "NodeJS/lodash/2.4.2", "NodeJS/lodash/3.9.0", "NodeJS/lodash/3.9.1", "NodeJS/lodash/3.10.1", "NodeJS/lodash/4.0.1", "NodeJS/lodash/4.3.0", "NodeJS/lodash/4.6.1", "NodeJS/lodash/4.8.0", "NodeJS/lodash/4.8.1", "NodeJS/lodash/4.8.2", "NodeJS/lodash/4.9.0", "NodeJS/lodash/4.11.0", "NodeJS/lodash/4.11.2", "NodeJS/lodash/4.12.0", "NodeJS/lodash/4.13.0", "NodeJS/lodash/4.14.0", "NodeJS/lodash/4.15.0", "NodeJS/lodash/4.16.0", "NodeJS/lodash/4.16.1", "NodeJS/lodash/4.16.2", "NodeJS/lodash/4.16.3", "NodeJS/lodash/4.16.4", "NodeJS/lodash/4.17.0", "NodeJS/lodash/4.17.1", "NodeJS/lodash/4.17.9", "NodeJS/lodash/4.17.10"]
Secure versions:
[]
Recommendation:
Update lodash module to version >=4.17.11
114 Other Versions