Vulnerability in mholt PapaParse up to 5.1.x, leading to inefficient regular expression complexit
Reporter | Title | Published | Views | Family All 17 |
---|---|---|---|---|
![]() | CVE-2020-36649 | 11 Jan 202300:00 | – | ubuntucve |
![]() | Security feature bypass | 11 Jan 202315:15 | – | prion |
![]() | GHSA-798H-G4J5-5537 PapaParse Inefficient Regular Expression Complexity vulnerability | 11 Jan 202315:30 | – | osv |
![]() | CVE-2020-36649 | 11 Jan 202315:15 | – | osv |
![]() | UBUNTU-CVE-2020-36649 | 11 Jan 202315:15 | – | osv |
![]() | MGASA-2023-0204 Updated mediawiki packages fix security vulnerability | 28 Jun 202305:21 | – | osv |
![]() | CVE-2020-36649 | 11 Jan 202315:15 | – | nvd |
![]() | CVE-2020-36649 mholt PapaParse papaparse.js redos | 11 Jan 202314:50 | – | cvelist |
![]() | CVE-2020-36649 | 11 Jan 202315:15 | – | debiancve |
![]() | CVE-2020-36649 | 12 Jan 202307:35 | – | redhatcve |
[
{
"vendor": "mholt",
"product": "PapaParse",
"versions": [
{
"version": "5.0",
"status": "affected"
},
{
"version": "5.1",
"status": "affected"
}
]
}
]
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo