lib/DatabaseLayer.py in cve-search before 4.1.0 allows regular expression injection, which can lead to ReDoS (regular expression denial of service) or other impacts.
The product uses a regular expression with an inefficient, possibly exponential worst-case computational complexity that consumes excessive CPU cycles.
Link | Tags |
---|---|
https://github.com/cve-search/cve-search/pull/629 | exploit third party advisory patch |
https://github.com/cve-search/cve-search/commit/c621f9f0693a728b93ff3b964f948a1d25917207 | third party advisory patch |
https://github.com/cve-search/cve-search/compare/v4.0...v4.1.0 | third party advisory |