Prior to lodash 4.17.11 this would be vulnerable to prototype pollution. An attacker could send the following GET request: ...
確定! 回上一頁