Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
pcre perl-compatible regular expression library vulnerabilities and exploits
(subscribe to this query)
9.8
CVSSv3
CVE-2015-8389
PCRE prior to 8.38 mishandles the /(?:|a|){100}x/ pattern and related patterns, which allows remote malicious users to cause a denial of service (infinite recursion) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp...
Pcre Perl Compatible Regular Expression Library
Fedoraproject Fedora 22
Php Php
9.8
CVSSv3
CVE-2015-8390
PCRE prior to 8.38 mishandles the [: and \\ substrings in character classes, which allows remote malicious users to cause a denial of service (uninitialized memory read) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript Re...
Pcre Perl Compatible Regular Expression Library
Fedoraproject Fedora 22
Php Php
9.8
CVSSv3
CVE-2015-8394
PCRE prior to 8.38 mishandles the (?(<digits>) and (?(R<digits>) conditions, which allows remote malicious users to cause a denial of service (integer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript...
Pcre Perl Compatible Regular Expression Library
Php Php
7.8
CVSSv3
CVE-2015-2325
The compile_branch function in PCRE prior to 8.37 allows context-dependent malicious users to compile incorrect code, cause a denial of service (out-of-bounds heap read and crash), or possibly have other unspecified impact via a regular expression with a group containing a forwar...
Pcre Pcre
Opensuse Opensuse 13.1
Opensuse Opensuse 13.2
Mariadb Mariadb
Php Php
7.5
CVSSv3
CVE-2015-8393
pcregrep in PCRE prior to 8.38 mishandles the -q option for binary files, which might allow remote malicious users to obtain sensitive information via a crafted file, as demonstrated by a CGI script that sends stdout data to a client.
Pcre Perl Compatible Regular Expression Library
Fedoraproject Fedora 22
Php Php
7.3
CVSSv3
CVE-2015-8387
PCRE prior to 8.38 mishandles (?123) subroutine calls and related subroutine calls, which allows remote malicious users to cause a denial of service (integer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegE...
Pcre Perl Compatible Regular Expression Library
Fedoraproject Fedora 22
Php Php
5.5
CVSSv3
CVE-2015-2326
The pcre_compile2 function in PCRE prior to 8.37 allows context-dependent malicious users to compile incorrect code and cause a denial of service (out-of-bounds read) via regular expression with a group containing both a forward referencing subroutine call and a recursive back re...
Pcre Pcre
Opensuse Opensuse 13.1
Opensuse Opensuse 13.2
Mariadb Mariadb
Php Php
NA
CVE-2015-8381
The compile_regex function in pcre_compile.c in PCRE prior to 8.38 and pcre2_compile.c in PCRE2 prior to 10.2x mishandles the /(?J:(?|(:(?|(?'R')(\k'R')|((?'R')))H'Rk'Rf)|s(?'R'))))/ and /(?J:(?|(:(?|(?'R')(\z(?|(?'...
Pcre Perl Compatible Regular Expression Library
NA
CVE-2015-8380
The pcre_exec function in pcre_exec.c in PCRE prior to 8.38 mishandles a // pattern with a \01 string, which allows remote malicious users to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demo...
Pcre Perl Compatible Regular Expression Library
Fedoraproject Fedora 22
NA
CVE-2015-8382
The match function in pcre_exec.c in PCRE prior to 8.37 mishandles the /(?:((abcd))|(((?:(?:(?:(?:abc|(?:abcdef))))b)abcdefghi)abc)|((*ACCEPT)))/ pattern and related patterns involving (*ACCEPT), which allows remote malicious users to obtain sensitive information from process mem...
Pcre Perl Compatible Regular Expression Library 8.36
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-23316
SQL injection
type confusion
CVE-2024-20697
CVE-2024-4344
local
CVE-2024-30043
CVE-2024-3821
CVE-2024-5041
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
NEXT »