A vulnerability in binary-husky/gpt_academic version 310122f allows for a Regular Expression Denial of Service (ReDoS) attack. The application uses a regular expression to parse user input, which can take polynomial time to match certain crafted inputs. This allows an attacker to send a small malicious payload to the server, causing it to become unresponsive and unable to handle any requests from other users.
Metrics
Affected Vendors & Products
References
History
Thu, 31 Jul 2025 18:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
CPEs | cpe:2.3:a:binary-husky:gpt_academic:2024-10-15:*:*:*:*:*:*:* |
Thu, 20 Mar 2025 19:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Thu, 20 Mar 2025 10:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A vulnerability in binary-husky/gpt_academic version 310122f allows for a Regular Expression Denial of Service (ReDoS) attack. The application uses a regular expression to parse user input, which can take polynomial time to match certain crafted inputs. This allows an attacker to send a small malicious payload to the server, causing it to become unresponsive and unable to handle any requests from other users. | |
Title | Regular Expression Denial of Service (ReDoS) in binary-husky/gpt_academic | |
Weaknesses | CWE-115 | |
References |
| |
Metrics |
cvssV3_0
|

Status: PUBLISHED
Assigner: @huntr_ai
Published: 2025-03-20T10:10:05.958Z
Updated: 2025-03-20T18:31:26.420Z
Reserved: 2024-12-09T21:29:37.986Z
Link: CVE-2024-12388

Updated: 2025-03-20T17:49:33.308Z

Status : Analyzed
Published: 2025-03-20T10:15:28.127
Modified: 2025-07-31T17:54:54.617
Link: CVE-2024-12388

No data.