ditto
ditto
**Is your feature request related to a problem? Please describe.** The PHP language has properties related to the arguments of a function call, such as array unpacking: `test(...$arg)`. This marks...
**Describe the bug** The following PHP code cannot be parsed correctly ```php
# Description ReDoS vulnerability is an algorithmic complexity vulnerability that usually appears in backtracking-kind regex engines, e.g. the javascript default regex engine. The attacker can construct malicious input to trigger...
# Description This vulnerability is the same as [issue](https://github.com/vercel/arg/issues/70). In this project, [Here](https://github.com/berstend/node-safe/blob/master/src/utils/arg.js#L149) has used the vulnerable regex `^-?\d*(\.(?=\d))?\d*$`. # How to repair Here is my repair solution: ```js function...
# Description ReDoS vulnerability is an algorithmic complexity vulnerability that usually appears in backtracking-kind regex engines, e.g. the javascript default regex engine. The attacker can construct malicious input to trigger...
The affected code is located in [grammar.js-line191](https://github.com/DmitrySoshnikov/syntax/blob/master/src/grammar/grammar.js#L191). It uses the vulnerable regular expression `'(\\.|[^'\\])*'`. When the match fails, it will cause catastrophic backtracking. I generate PoC using the python script...
**Describe the bug** ```php
# Description ReDoS vulnerability is an algorithmic complexity vulnerability that usually appears in backtracking-kind regex engines, e.g. the python default regex engine. The attacker can construct malicious input to trigger...
Because CPG does not support default parameter values currently, user cannot do query related to default parameters. **Describe the solution you'd like** The `code` field of the existing Method does...