A flaw in oniguruma may lead to buffer overflow due to regular expression compilatio
Reporter | Title | Published | Views | Family All 48 |
---|---|---|---|---|
![]() | Design/Logic Flaw | 30 Sep 202021:15 | – | prion |
![]() | Photon OS 3.0: Oniguruma PHSA-2020-3.0-0155 | 24 Oct 202000:00 | – | nessus |
![]() | Linux Distros Unpatched Vulnerability : CVE-2020-26159 | 4 Mar 202500:00 | – | nessus |
![]() | Debian DLA-2431-2 : libonig regression update | 6 Nov 202000:00 | – | nessus |
![]() | Fedora 32 : oniguruma (2020-952c499e9d) | 12 Oct 202000:00 | – | nessus |
![]() | Fedora 31 : oniguruma (2020-d53469eceb) | 12 Oct 202000:00 | – | nessus |
![]() | SUSE SLES12 Security Update : oniguruma (SUSE-SU-2024:2993-1) | 22 Aug 202400:00 | – | nessus |
![]() | Amazon Linux 2 : oniguruma (ALAS-2020-1560) | 11 Nov 202000:00 | – | nessus |
![]() | Photon OS 2.0: Oniguruma PHSA-2020-2.0-0291 | 21 Oct 202000:00 | – | nessus |
![]() | Fedora 33 : oniguruma (2020-bc758654d1) | 8 Oct 202000:00 | – | nessus |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo