SPARQL Injection in VIVO Vitro v1.10.0 allows a remote attacker to execute arbitrary SPARQL via the uri parameter, leading to a regular expression denial of service (ReDoS), as demonstrated by crafted use of FILTER%20regex in a /individual?uri= request.
{ "nvd_published_at": "2019-01-28T15:29:00Z", "cwe_ids": [ "CWE-400", "CWE-77" ], "severity": "HIGH", "github_reviewed": true, "github_reviewed_at": "2022-11-01T23:33:34Z" }