Lucene search

K

CVE-2020-36649

🗓️ 11 Jan 2023 15:09:15Reported by VulDBType 
cve
 cve
🔗 web.nvd.nist.gov👁 63 Views

Vulnerability in mholt PapaParse up to 5.1.x, leading to inefficient regular expression complexit

Show more

5 of 5AI Insights are available for you today

Leverage the power of AI to quickly understand vulnerabilities, impacts, and exploitability

Related
Detection
Affected
Refs
ReporterTitlePublishedViews
Family
UbuntuCve
CVE-2020-36649
11 Jan 202300:00
ubuntucve
Prion
Security feature bypass
11 Jan 202315:15
prion
OSV
GHSA-798H-G4J5-5537 PapaParse Inefficient Regular Expression Complexity vulnerability
11 Jan 202315:30
osv
OSV
CVE-2020-36649
11 Jan 202315:15
osv
OSV
UBUNTU-CVE-2020-36649
11 Jan 202315:15
osv
OSV
MGASA-2023-0204 Updated mediawiki packages fix security vulnerability
28 Jun 202305:21
osv
NVD
CVE-2020-36649
11 Jan 202315:15
nvd
Cvelist
CVE-2020-36649 mholt PapaParse papaparse.js redos
11 Jan 202314:50
cvelist
Debian CVE
CVE-2020-36649
11 Jan 202315:15
debiancve
RedhatCVE
CVE-2020-36649
12 Jan 202307:35
redhatcve
Rows per page
Nvd
Vulners
Node
papaparsepapaparseRange5.1.05.2.0
[
  {
    "vendor": "mholt",
    "product": "PapaParse",
    "versions": [
      {
        "version": "5.0",
        "status": "affected"
      },
      {
        "version": "5.1",
        "status": "affected"
      }
    ]
  }
]

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo
11 Jan 2023 15:15Current
5.5Medium risk
Vulners AI Score5.5
CVSS22.3
CVSS33.5 - 7.5
EPSS0.00079
63
.json
Report