Pcre

Pcre

33 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 4.13%
  • Veröffentlicht 07.07.2008 23:41:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

Heap-based buffer overflow in pcre_compile.c in the Perl-Compatible Regular Expression (PCRE) library 7.7 allows context-dependent attackers to cause a denial of service (crash) or possibly execute arbitrary code via a regular expression that begins ...

  • EPSS 23.42%
  • Veröffentlicht 18.02.2008 23:00:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

Buffer overflow in PCRE before 7.6 allows remote attackers to execute arbitrary code via a regular expression containing a character class with a large number of characters with Unicode code points greater than 255.

  • EPSS 2.48%
  • Veröffentlicht 15.11.2007 19:46:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

Perl-Compatible Regular Expression (PCRE) library before 7.0 does not properly calculate the amount of memory needed for a compiled regular expression pattern when the (1) -x or (2) -i UTF-8 options change within the pattern, which allows context-dep...

  • EPSS 2.88%
  • Veröffentlicht 14.11.2007 21:46:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

Integer overflow in Perl-Compatible Regular Expression (PCRE) library before 6.7 might allow context-dependent attackers to execute arbitrary code via a regular expression that involves large (1) min, (2) max, or (3) duplength values that cause an in...

  • EPSS 2.17%
  • Veröffentlicht 14.11.2007 21:46:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

Integer overflow in Perl-Compatible Regular Expression (PCRE) library before 6.7 allows context-dependent attackers to execute arbitrary code via a regular expression containing a large number of named subpatterns (name_count) or long subpattern name...

  • EPSS 12.41%
  • Veröffentlicht 07.11.2007 23:46:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

Heap-based buffer overflow in Perl-Compatible Regular Expression (PCRE) library before 7.3 allows context-dependent attackers to execute arbitrary code via a singleton Unicode sequence in a character class in a regex pattern, which is incorrectly opt...

  • EPSS 2.61%
  • Veröffentlicht 07.11.2007 23:46:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

Perl-Compatible Regular Expression (PCRE) library before 7.3 does not properly compute the length of (1) a \p sequence, (2) a \P sequence, or (3) a \P{x} sequence, which allows context-dependent attackers to cause a denial of service (infinite loop o...

  • EPSS 5.11%
  • Veröffentlicht 07.11.2007 23:46:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

Multiple integer overflows in Perl-Compatible Regular Expression (PCRE) library before 7.3 allow context-dependent attackers to cause a denial of service (crash) or execute arbitrary code via unspecified escape (backslash) sequences.

  • EPSS 5.39%
  • Veröffentlicht 07.11.2007 23:46:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

Perl-Compatible Regular Expression (PCRE) library before 7.3 reads past the end of the string when searching for unmatched brackets and parentheses, which allows context-dependent attackers to cause a denial of service (crash), possibly involving for...

  • EPSS 5.63%
  • Veröffentlicht 07.11.2007 23:46:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

Perl-Compatible Regular Expression (PCRE) library before 7.0 does not properly calculate sizes for unspecified "multiple forms of character class", which triggers a buffer overflow that allows context-dependent attackers to cause a denial of service ...