Lodash versions prior to 4.17.21 are vulnerable to Regular Expression Denial of Service (ReDoS) via the toNumber, trim and trimEnd functions.

Project Subscriptions

Vendors Products
Banking Corporate Lending Process Management Subscribe
Banking Credit Facilities Process Management Subscribe
Banking Extensibility Workbench Subscribe
Banking Supply Chain Finance Subscribe
Banking Trade Finance Process Management Subscribe
Communications Cloud Native Core Policy Subscribe
Communications Design Studio Subscribe
Communications Services Gatekeeper Subscribe
Communications Session Border Controller Subscribe
Enterprise Communications Broker Subscribe
Financial Services Crime And Compliance Management Studio Subscribe
Health Sciences Data Management Workbench Subscribe
Jd Edwards Enterpriseone Tools Subscribe
Peoplesoft Enterprise Peopletools Subscribe
Primavera Gateway Subscribe
Primavera Unifier Subscribe
Retail Customer Management And Segmentation Foundation Subscribe
Openshift Subscribe
Rhev Hypervisor Subscribe
Rhev Manager Subscribe
Siemens Subscribe
Sinec Ins Subscribe
Advisories
Source ID Title
EUVD EUVD EUVD-2022-0424 Regular Expression Denial of Service (ReDoS) in lodash
Github GHSA Github GHSA GHSA-29mw-wpgm-hmr9 Regular Expression Denial of Service (ReDoS) in lodash
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Sun, 08 Sep 2024 18:30:00 +0000

Type Values Removed Values Added
CPEs cpe:/a:redhat:acm:2.2::el7

Mon, 19 Aug 2024 22:15:00 +0000

Type Values Removed Values Added
CPEs cpe:/a:redhat:acm:2.2::el7
cpe:/a:redhat:acm:2.2::el8

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: snyk

Published:

Updated: 2024-09-16T22:15:52.206Z

Reserved: 2020-11-12T00:00:00

Link: CVE-2020-28500

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2021-02-15T11:15:12.397

Modified: 2024-11-21T05:22:55.053

Link: CVE-2020-28500

cve-icon Redhat

Severity : Moderate

Publid Date: 2021-02-15T00:00:00Z

Links: CVE-2020-28500 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses