nth-check is vulnerable to Inefficient Regular Expression Complexity
The product uses a regular expression with an inefficient, possibly exponential worst-case computational complexity that consumes excessive CPU cycles.
Link | Tags |
---|---|
https://huntr.dev/bounties/8cf8cc06-d2cf-4b4e-b42c-99fafb0b04d0 | patch exploit third party advisory issue tracking |
https://github.com/fb55/nth-check/commit/9894c1d2010870c351f66c6f6efcf656e26bb726 | third party advisory patch |
https://lists.debian.org/debian-lts-announce/2023/05/msg00023.html | third party advisory mailing list |