Index | index by Group | index by Distribution | index by Vendor | index by creation date | index by Name | Mirrors | Help |
The search service can find package by either name (apache), provides(webserver), absolute file names (/usr/bin/apache), binaries (gprof) or shared libraries (libXm.so.2) in standard path. It does not support multiple arguments yet...
The System and Arch are optional added filters, for example System could be "redhat", "redhat-7.2", "mandrake" or "gnome", Arch could be "i386" or "src", etc. depending on your system.
Many default regular expression parsers have unbounded worst-case complexity. Regex matching may be quick when presented with a matching input string. However, certain non-matching input strings can make the regular expression matcher go into crazy backtracking loops and take ages to process. This can cause denial of service, as the CPU will be stuck trying to match the regex. This tool is designed to: * find regular expressions which are vulnerable to ReDoS * give an example malicious string which will cause catastrophic backtracking Supports: - C# - JavaScript/TypeScript (requires node to be installed) - JSON - Python - YAML
Package | Summary | Distribution | Download |
Find regular expressions vulnerable to ReDoS | regexploit-1.0.0-2.4.noarch.rpm | ||
regexploit-1.0.0-2.4.noarch.html | Find regular expressions vulnerable to ReDoS | OpenSuSE Ports Tumbleweed for noarch | regexploit-1.0.0-2.4.noarch.rpm |
regexploit-1.0.0-2.4.noarch.html | Find regular expressions vulnerable to ReDoS | OpenSuSE Tumbleweed for noarch | regexploit-1.0.0-2.4.noarch.rpm |
regexploit-1.0.0-lp160.1.1.noarch.html | Find regular expressions vulnerable to ReDoS | OpenSuSE Leap 16.0 for noarch | regexploit-1.0.0-lp160.1.1.noarch.rpm |
Generated by rpm2html 1.6