nltk is vulnerable to Inefficient Regular Expression Complexity
The product uses a regular expression with an inefficient, possibly exponential worst-case computational complexity that consumes excessive CPU cycles.
Link | Tags |
---|---|
https://huntr.dev/bounties/761a761e-2be2-430a-8d92-6f74ffe9866a | issue tracking patch exploit third party advisory |
https://github.com/nltk/nltk/commit/2a50a3edc9d35f57ae42a921c621edc160877f4d | third party advisory patch |