CVE-2020-7791

Denial of Service (DoS)

Description

This affects the package i18n before 2.1.15. Vulnerability arises out of insufficient handling of erroneous language tags in src/i18n/Concrete/TextLocalizer.cs and src/i18n/LocalizedApplication.cs.

7.5
CVSS
Severity: High
CVSS 3.1 •
CVSS 2.0 •
EPSS 1.48% Top 20%
Third-Party Advisory github.com Third-Party Advisory github.com Third-Party Advisory snyk.io
Affected: n/a i18n
Published at:
Updated at:

References

Link Tags
https://snyk.io/vuln/SNYK-DOTNET-I18N-1050179 third party advisory
https://github.com/turquoiseowl/i18n/issues/387 issue tracking third party advisory
https://github.com/turquoiseowl/i18n/commit/c418e3345313dc896c1951d8c46ab0b9b12fcbd3 third party advisory patch
https://lists.apache.org/thread.html/rc2abba7aa0450198494bbee654fce9b97fad72a4989323e189faede4%40%3Cdev.myfaces.apache.org%3E mailing list
https://lists.apache.org/thread.html/r33dc233634aedb04fa77db3eb79ea12d15ca4da89fa46a1c585ecb0b%40%3Ccommits.druid.apache.org%3E mailing list
https://lists.apache.org/thread.html/r9744574911e7e4edf5f4eeae92a4ccc83e3723cec937950062bb8775%40%3Ccommits.druid.apache.org%3E mailing list
https://lists.apache.org/thread.html/r394b1ae54693609a60ea8aab02ff045dc92f593aa3aebff562e69958%40%3Ccommits.druid.apache.org%3E mailing list
https://lists.apache.org/thread.html/r2667286c8ceffaf893b16829b9612d8f7c4ee6b30362c6c1b583e3c2%40%3Ccommits.druid.apache.org%3E mailing list
https://lists.apache.org/thread.html/ra5047392edf1fecba441c9adc8807ed6c5f7d2cc71f2f3bb89f35371%40%3Ccommits.druid.apache.org%3E mailing list
https://lists.apache.org/thread.html/rc850d0fce066f9eb9e8553172d9207bad7df4d2059d93abc5c7e85c4%40%3Ccommits.druid.apache.org%3E mailing list
https://lists.apache.org/thread.html/r1573c58dc283b05f7a40a3f5ff0079b5bbde0492d406ee0fe98d40b6%40%3Ccommits.druid.apache.org%3E mailing list
https://lists.apache.org/thread.html/r5e08837e695efd36be73510ce58ec05785dbcea077819d8acc2d990d%40%3Ccommits.druid.apache.org%3E mailing list

Frequently Asked Questions

What is the severity of CVE-2020-7791?
CVE-2020-7791 has been scored as a high severity vulnerability.
How to fix CVE-2020-7791?
To fix CVE-2020-7791, make sure you are using an up-to-date version of the affected component(s) by checking the vendor release notes. As for now, there are no other specific guidelines available.
Is CVE-2020-7791 being actively exploited in the wild?
It is possible that CVE-2020-7791 is being exploited or will be exploited in a near future based on public information. According to its EPSS score, there is a ~1% probability that this vulnerability will be exploited by malicious actors in the next 30 days.
What software or system is affected by CVE-2020-7791?
CVE-2020-7791 affects n/a i18n.
This platform uses data from the NIST NVD, MITRE CVE, MITRE CWE, First.org and CISA KEV but is not endorsed or certified by these entities. CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site.
© 2025 Under My Watch. All Rights Reserved.