lodash is vulnerable to regular expression denial of service. The usage of the insecure regex /\s+$/
allows an attacker to cause exponential processing time which could eventually lead to a denial of service condition.
github.com/lodash/lodash/blob/npm/trimEnd.js%23L8
github.com/lodash/lodash/pull/5065
security.netapp.com/advisory/ntap-20210312-0006/
www.oracle.com//security-alerts/cpujul2021.html
www.oracle.com/security-alerts/cpujan2022.html
www.oracle.com/security-alerts/cpujul2022.html
www.oracle.com/security-alerts/cpuoct2021.html