The nltk package is vulnerable to ReDoS (regular expression denial of service). An attacker that is able to provide as an input to the _read_comparison_block()
function in the file nltk/corpus/reader/comparative_sents.py
may cause an application to consume an excessive amount of CPU.