Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
pcre pcre vulnerabilities and exploits
(subscribe to this query)
571
VMScore
CVE-2016-2176
The X509_NAME_oneline function in crypto/x509/x509_obj.c in OpenSSL prior to 1.0.1t and 1.0.2 prior to 1.0.2h allows remote malicious users to obtain sensitive information from process stack memory or cause a denial of service (buffer over-read) via crafted EBCDIC ASN.1 data.
Openssl Openssl 1.0.2a
Openssl Openssl 1.0.2e
Openssl Openssl 1.0.2b
Openssl Openssl 1.0.2g
Openssl Openssl 1.0.2c
Openssl Openssl 1.0.2
Openssl Openssl
Openssl Openssl 1.0.2f
Openssl Openssl 1.0.2d
1 Article
668
VMScore
CVE-2014-9769
pcre_jit_compile.c in PCRE 8.35 does not properly use table jumps to optimize nested alternatives, which allows remote malicious users to cause a denial of service (stack memory corruption) or possibly have unspecified other impact via a crafted string, as demonstrated by packets...
Pcre Pcre 8.35
NA
CVE-2015-83832016
PHP bundles the Perl-Compatible Regular Expressions (PCRE) library for RegExp parsing, which SecurityCenter implements. PHP 5.6.18 was released that fixes a variety of issues in the bundled PCRE library, that includes: CVE-2015-8383 - PCRE RegExp Repeated Conditional Group Handli...
668
VMScore
CVE-2015-8381
The compile_regex function in pcre_compile.c in PCRE prior to 8.38 and pcre2_compile.c in PCRE2 prior to 10.2x mishandles the /(?J:(?|(:(?|(?'R')(\k'R')|((?'R')))H'Rk'Rf)|s(?'R'))))/ and /(?J:(?|(:(?|(?'R')(\z(?|(?'...
Pcre Perl Compatible Regular Expression Library
668
VMScore
CVE-2015-8380
The pcre_exec function in pcre_exec.c in PCRE prior to 8.38 mishandles a // pattern with a \01 string, which allows remote malicious users to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demo...
Pcre Perl Compatible Regular Expression Library
Fedoraproject Fedora 22
668
VMScore
CVE-2015-8387
PCRE prior to 8.38 mishandles (?123) subroutine calls and related subroutine calls, which allows remote malicious users to cause a denial of service (integer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegE...
Pcre Perl Compatible Regular Expression Library
Fedoraproject Fedora 22
Php Php
668
VMScore
CVE-2015-8389
PCRE prior to 8.38 mishandles the /(?:|a|){100}x/ pattern and related patterns, which allows remote malicious users to cause a denial of service (infinite recursion) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp...
Pcre Perl Compatible Regular Expression Library
Fedoraproject Fedora 22
Php Php
668
VMScore
CVE-2015-8390
PCRE prior to 8.38 mishandles the [: and \\ substrings in character classes, which allows remote malicious users to cause a denial of service (uninitialized memory read) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript Re...
Pcre Perl Compatible Regular Expression Library
Fedoraproject Fedora 22
Php Php
446
VMScore
CVE-2015-8393
pcregrep in PCRE prior to 8.38 mishandles the -q option for binary files, which might allow remote malicious users to obtain sensitive information via a crafted file, as demonstrated by a CGI script that sends stdout data to a client.
Pcre Perl Compatible Regular Expression Library
Fedoraproject Fedora 22
Php Php
670
VMScore
CVE-2015-8394
PCRE prior to 8.38 mishandles the (?(<digits>) and (?(R<digits>) conditions, which allows remote malicious users to cause a denial of service (integer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript...
Pcre Perl Compatible Regular Expression Library
Php Php
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-33572
CVE-2024-24919
CVE-2024-0230
CVE-2024-32714
HTML injection
local file inclusion
CVE-2024-31098
CVE-2024-31244
privilege
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
NEXT »