### [CVE-2020-7661](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7661) ![](https://img.shields.io/static/v1?label=Product&message=url-regex&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=Regular%20Expression%20Denial%20of%20Service&color=brighgreen) ### Description all versions of url-regex are vulnerable to Regular Expression Denial of Service. An attacker providing a very long string in String.test can cause a Denial of Service. ### POC #### Reference - https://snyk.io/vuln/SNYK-JS-URLREGEX-569472 - https://snyk.io/vuln/SNYK-JS-URLREGEX-569472 #### Github - https://github.com/0xT11/CVE-POC - https://github.com/ARPSyndicate/cvemon - https://github.com/NoodleOfDeath/social-bio-bot - https://github.com/Pietruszka69/dddd - https://github.com/beehunt9r/instagram-private-api - https://github.com/developer3000S/PoC-in-GitHub - https://github.com/dilame/instagram-private-api - https://github.com/engn33r/awesome-redos-security - https://github.com/haxzie/streamon-instagram-private-api - https://github.com/hectorgie/PoC-in-GitHub - https://github.com/nomi-sec/PoC-in-GitHub - https://github.com/ocavue/url-regex-unsafe - https://github.com/remygin/ipa - https://github.com/soosmile/POC - https://github.com/spamscanner/url-regex-safe - https://github.com/wdwdwd01/ipa