New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Fix regular expressions that are vulnerable to ReDoS #74
Comments
For example https://ihateregex.io/expr/email Probably not vulnerable to ReDoS but not entirely correct because there is no limit Also https://stackoverflow.com/questions/52756066/is-email-regex-pattern-suggested-by-w3c-spec-prone-to-redos-attacks |
ghost
changed the title
Remove regular expressions that are vulnerable to ReDoS
Fix regular expressions that are vulnerable to ReDoS
Feb 20, 2021
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Labels
None yet
0 participants
https://en.wikipedia.org/wiki/ReDoS
https://owasp.org/www-community/attacks/Regular_expression_Denial_of_Service_-_ReDoS
The text was updated successfully, but these errors were encountered: