{"id":"CVE-2021-3842","details":"nltk is vulnerable to Inefficient Regular Expression Complexity","aliases":["GHSA-rqjh-jp2r-59cj","PYSEC-2022-5"],"modified":"2026-04-10T04:36:39.466479Z","published":"2022-01-04T15:15:07.833Z","references":[{"type":"FIX","url":"https://github.com/nltk/nltk/commit/2a50a3edc9d35f57ae42a921c621edc160877f4d"},{"type":"FIX","url":"https://huntr.dev/bounties/761a761e-2be2-430a-8d92-6f74ffe9866a"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/nltk/nltk","events":[{"introduced":"0"},{"fixed":"4862b094ae4a9aa04396e06335ae52f7920e48c7"},{"fixed":"2a50a3edc9d35f57ae42a921c621edc160877f4d"}],"database_specific":{"versions":[{"introduced":"0"},{"fixed":"3.6.6"}]}}],"versions":["2.0.1rc1","2.0.1rc2","2.0.1rc3","2.0.1rc4","3.0.0b1","3.0.2","3.0.3","3.0.4","3.0.5","3.0a4","3.1","3.2","3.2.1","3.2.2","3.2.3","3.2.4","3.2.5","3.3","3.4","3.4.1","3.4.3","3.4.4","3.5","3.5b1","3.6","3.6.1","3.6.2","3.6.5"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2021-3842.json","unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"9.0"}]},{"events":[{"introduced":"0"},{"last_affected":"10.0"}]},{"events":[{"introduced":"0"},{"last_affected":"11.0"}]},{"events":[{"introduced":"0"},{"last_affected":"35"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}]}