### [CVE-2019-1010266](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1010266) ![](https://img.shields.io/static/v1?label=Product&message=lodash&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=%3C4.17.11%20%5Bfixed%3A%204.7.11%5D%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-400%3A%20Uncontrolled%20Resource%20Consumption&color=brightgreen) ### Description lodash prior to 4.17.11 is affected by: CWE-400: Uncontrolled Resource Consumption. The impact is: Denial of service. The component is: Date handler. The attack vector is: Attacker provides very long strings, which the library attempts to match using a regular expression. The fixed version is: 4.17.11. ### POC #### Reference - https://snyk.io/vuln/SNYK-JS-LODASH-73639 #### Github - https://github.com/ARPSyndicate/cvemon - https://github.com/HotDB-Community/HotDB-Engine - https://github.com/chkp-dhouari/CloudGuard-ShiftLeft-CICD - https://github.com/dcambronero/shiftleft - https://github.com/endorama/CsvToL10nJson - https://github.com/najla-zwawi/SpectrolOpsTest - https://github.com/nilsujma-dev/CloudGuard-ShiftLeft-CICD - https://github.com/ossf-cve-benchmark/CVE-2019-1010266 - https://github.com/p3sky/Cloudguard-Shifleft-CICD - https://github.com/puryersc/shiftleftv2 - https://github.com/puryersc/shiftleftv3 - https://github.com/puryersc/shiftleftv4 - https://github.com/seal-community/patches