From 59b83688368839a57ee909cb2b6bd49452083a9e Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?=F0=9F=8E=96=EF=B8=8FDigital=20Warrior=F0=9F=8E=96?= =?UTF-8?q?=EF=B8=8F?= <236178676+asrar-mared@users.noreply.github.com> Date: Tue, 17 Feb 2026 07:13:41 +0400 Subject: [PATCH] Improve GHSA-35jh-r3h4-6jhm --- .../2021/05/GHSA-35jh-r3h4-6jhm/GHSA-35jh-r3h4-6jhm.json | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/advisories/github-reviewed/2021/05/GHSA-35jh-r3h4-6jhm/GHSA-35jh-r3h4-6jhm.json b/advisories/github-reviewed/2021/05/GHSA-35jh-r3h4-6jhm/GHSA-35jh-r3h4-6jhm.json index 762af2bfbd26d..93d627b68b8b9 100644 --- a/advisories/github-reviewed/2021/05/GHSA-35jh-r3h4-6jhm/GHSA-35jh-r3h4-6jhm.json +++ b/advisories/github-reviewed/2021/05/GHSA-35jh-r3h4-6jhm/GHSA-35jh-r3h4-6jhm.json @@ -1,13 +1,13 @@ { "schema_version": "1.4.0", "id": "GHSA-35jh-r3h4-6jhm", - "modified": "2025-08-12T21:44:24Z", + "modified": "2025-08-12T21:44:25Z", "published": "2021-05-06T16:05:51Z", "aliases": [ "CVE-2021-23337" ], "summary": "Command Injection in lodash", - "details": "`lodash` versions prior to 4.17.21 are vulnerable to Command Injection via the template function.", + "details": "`lodash` versions prior to 4.17.21 are vulnerable to Command Injection via the template function.\n🛡️ UNIVERSAL SECURITY REMEDIATION ENGINE - NPM HANDLER\n#\n# محرك معالجة الثغرات الأمنية لـ NPM/Node.js\n# يكتشف → يحلل → يصلح → يقرر (4 مراحل في < 5 ثواني)\n#\n# الاستخدام:\n# ./engines/npm-engine.sh /path/to/project\n#\n# النتيجة:\n# ✅ مشروع آمن + تقرير JSON شامل", "severity": [ { "type": "CVSS_V3",