prism is vulnerable to Inefficient Regular Expression Complexity
The product uses a regular expression with an inefficient, possibly exponential worst-case computational complexity that consumes excessive CPU cycles.
| Name | Vendor | Start Version | End Version | 
|---|---|---|---|
| Prism | Prismjs | * | 1.25.0 (excluding) | 
| RHACS-3.67-RHEL-8 | RedHat | advanced-cluster-security/rhacs-rhel8-operator:3.67.0-3 | * | 
| Node-prismjs | Ubuntu | focal | * | 
| Node-prismjs | Ubuntu | hirsute | * | 
| Node-prismjs | Ubuntu | impish | * | 
| Node-prismjs | Ubuntu | kinetic | * | 
| Node-prismjs | Ubuntu | lunar | * | 
| Node-prismjs | Ubuntu | mantic | * | 
| Node-prismjs | Ubuntu | oracular | * | 
| Node-prismjs | Ubuntu | trusty | * | 
| Node-prismjs | Ubuntu | xenial | * | 
	  Attackers can create crafted inputs that
	  intentionally cause the regular expression to use
	  excessive backtracking in a way that causes the CPU
	  consumption to spike.