Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-0912 | Lodash versions prior to 4.17.21 are vulnerable to Command Injection via the template function. |
Github GHSA |
GHSA-35jh-r3h4-6jhm | Command Injection in lodash |
Wed, 16 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Sun, 08 Sep 2024 18:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:/a:redhat:acm:2.2::el7 |
Mon, 19 Aug 2024 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:/a:redhat:acm:2.2::el8 |
Subscriptions
Status: PUBLISHED
Assigner: snyk
Published:
Updated: 2024-09-16T19:15:17.074Z
Reserved: 2021-01-08T00:00:00.000Z
Link: CVE-2021-23337
No data.
Status : Modified
Published: 2021-02-15T13:15:12.560
Modified: 2024-11-21T05:51:31.643
Link: CVE-2021-23337
OpenCVE Enrichment
No data.
EUVD
Github GHSA