diff --git a/advisories/github-reviewed/2021/05/GHSA-35jh-r3h4-6jhm/GHSA-35jh-r3h4-6jhm.json b/advisories/github-reviewed/2021/05/GHSA-35jh-r3h4-6jhm/GHSA-35jh-r3h4-6jhm.json index 762af2bfbd26d..93d627b68b8b9 100644 --- a/advisories/github-reviewed/2021/05/GHSA-35jh-r3h4-6jhm/GHSA-35jh-r3h4-6jhm.json +++ b/advisories/github-reviewed/2021/05/GHSA-35jh-r3h4-6jhm/GHSA-35jh-r3h4-6jhm.json @@ -1,13 +1,13 @@ { "schema_version": "1.4.0", "id": "GHSA-35jh-r3h4-6jhm", - "modified": "2025-08-12T21:44:24Z", + "modified": "2025-08-12T21:44:25Z", "published": "2021-05-06T16:05:51Z", "aliases": [ "CVE-2021-23337" ], "summary": "Command Injection in lodash", - "details": "`lodash` versions prior to 4.17.21 are vulnerable to Command Injection via the template function.", + "details": "`lodash` versions prior to 4.17.21 are vulnerable to Command Injection via the template function.\n🛡️ UNIVERSAL SECURITY REMEDIATION ENGINE - NPM HANDLER\n#\n# محرك معالجة الثغرات الأمنية لـ NPM/Node.js\n# يكتشف → يحلل → يصلح → يقرر (4 مراحل في < 5 ثواني)\n#\n# الاستخدام:\n# ./engines/npm-engine.sh /path/to/project\n#\n# النتيجة:\n# ✅ مشروع آمن + تقرير JSON شامل", "severity": [ { "type": "CVSS_V3",