Lucene search

K
PcrePcre

33 matches found

CVE
CVE
added 2020/06/15 5:15 p.m.291 views

CVE-2020-14155

libpcre in PCRE before 8.44 allows an integer overflow via a large number after a (?C substring.

5.3CVSS6.4AI score0.00152EPSS
CVE
CVE
added 2020/06/15 5:15 p.m.260 views

CVE-2019-20838

libpcre in PCRE before 8.43 allows a subject buffer over-read in JIT when UTF is disabled, and \X or \R has more than one fixed quantifier, a related issue to CVE-2019-20454.

7.5CVSS6.7AI score0.00182EPSS
CVE
CVE
added 2020/01/14 5:15 p.m.223 views

CVE-2015-2325

The compile_branch function in PCRE before 8.37 allows context-dependent attackers to compile incorrect code, cause a denial of service (out-of-bounds heap read and crash), or possibly have other unspecified impact via a regular expression with a group containing a forward reference repeated a larg...

7.8CVSS6.6AI score0.00661EPSS
CVE
CVE
added 2016/12/13 4:59 p.m.216 views

CVE-2015-3217

PCRE 7.8 and 8.32 through 8.37, and PCRE2 10.10 mishandle group empty matches, which might allow remote attackers to cause a denial of service (stack-based buffer overflow) via a crafted regular expression, as demonstrated by /^(?:(?(1)\.|([^\\W_])?)+)+$/.

7.5CVSS6.7AI score0.02892EPSS
CVE
CVE
added 2016/01/03 12:59 a.m.177 views

CVE-2016-1283

The pcre_compile2 function in pcre_compile.c in PCRE 8.38 mishandles the /((?:F?+(?:^(?(R)a+"){99}-))(?J)(?'R'(?'R'

9.8CVSS9.6AI score0.02468EPSS
CVE
CVE
added 2020/01/14 5:15 p.m.161 views

CVE-2015-2326

The pcre_compile2 function in PCRE before 8.37 allows context-dependent attackers to compile incorrect code and cause a denial of service (out-of-bounds read) via regular expression with a group containing both a forward referencing subroutine call and a recursive back reference, as demonstrated by...

5.5CVSS6.1AI score0.00262EPSS
CVE
CVE
added 2016/03/17 11:59 p.m.151 views

CVE-2016-3191

The compile_branch function in pcre_compile.c in PCRE 8.x before 8.39 and pcre2_compile.c in PCRE2 before 10.22 mishandles patterns containing an (*ACCEPT) substring in conjunction with nested parentheses, which allows remote attackers to execute arbitrary code or cause a denial of service (stack-b...

9.8CVSS9.5AI score0.06286EPSS
CVE
CVE
added 2017/07/11 3:29 a.m.135 views

CVE-2017-11164

In PCRE 8.41, the OP_KETRMAX feature in the match function in pcre_exec.c allows stack exhaustion (uncontrolled recursion) when processing a crafted regular expression.

7.8CVSS7.2AI score0.0021EPSS
CVE
CVE
added 2015/12/02 1:59 a.m.124 views

CVE-2015-8391

The pcre_compile function in pcre_compile.c in PCRE before 8.38 mishandles certain [: nesting, which allows remote attackers to cause a denial of service (CPU consumption) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encou...

9.8CVSS7.6AI score0.10015EPSS
CVE
CVE
added 2008/07/07 11:41 p.m.122 views

CVE-2008-2371

Heap-based buffer overflow in pcre_compile.c in the Perl-Compatible Regular Expression (PCRE) library 7.7 allows context-dependent attackers to cause a denial of service (crash) or possibly execute arbitrary code via a regular expression that begins with an option and contains multiple branches.

7.5CVSS9.2AI score0.04265EPSS
CVE
CVE
added 2017/03/20 12:59 a.m.116 views

CVE-2017-7186

libpcre1 in PCRE 8.40 and libpcre2 in PCRE2 10.23 allow remote attackers to cause a denial of service (segmentation violation for read access, and application crash) by triggering an invalid Unicode property lookup.

7.5CVSS7.2AI score0.04966EPSS
CVE
CVE
added 2017/03/23 9:59 p.m.116 views

CVE-2017-7245

Stack-based buffer overflow in the pcre32_copy_substring function in pcre_get.c in libpcre1 in PCRE 8.40 allows remote attackers to cause a denial of service (WRITE of size 4) or possibly have unspecified other impact via a crafted file.

7.8CVSS7.9AI score0.00414EPSS
CVE
CVE
added 2017/03/23 9:59 p.m.113 views

CVE-2017-7246

Stack-based buffer overflow in the pcre32_copy_substring function in pcre_get.c in libpcre1 in PCRE 8.40 allows remote attackers to cause a denial of service (WRITE of size 268) or possibly have unspecified other impact via a crafted file.

7.8CVSS7.9AI score0.00357EPSS
CVE
CVE
added 2017/03/23 9:59 p.m.112 views

CVE-2017-7244

The _pcre32_xclass function in pcre_xclass.c in libpcre1 in PCRE 8.40 allows remote attackers to cause a denial of service (invalid memory read) via a crafted file.

5.5CVSS5.8AI score0.00762EPSS
CVE
CVE
added 2017/02/16 11:59 a.m.107 views

CVE-2017-6004

The compile_bracket_matchingpath function in pcre_jit_compile.c in PCRE through 8.x before revision 1680 (e.g., the PHP 7.1.1 bundled version) allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted regular expression.

7.5CVSS7.1AI score0.01137EPSS
CVE
CVE
added 2016/12/13 4:59 p.m.104 views

CVE-2015-5073

Heap-based buffer overflow in the find_fixedlength function in pcre_compile.c in PCRE before 8.38 allows remote attackers to cause a denial of service (crash) or obtain sensitive information from heap memory and possibly bypass the ASLR protection mechanism via a crafted regular expression with an ...

9.1CVSS7.6AI score0.00714EPSS
CVE
CVE
added 2014/12/16 6:59 p.m.99 views

CVE-2014-8964

Heap-based buffer overflow in PCRE 8.36 and earlier allows remote attackers to cause a denial of service (crash) or have other unspecified impact via a crafted regular expression, related to an assertion that allows zero repeats.

5CVSS8.4AI score0.02089EPSS
CVE
CVE
added 2015/12/02 1:59 a.m.92 views

CVE-2015-2328

PCRE before 8.36 mishandles the /((?(R)a|(?1)))+/ pattern and related patterns with certain recursion, which allows remote attackers to cause a denial of service (segmentation fault) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp o...

7.5CVSS7.5AI score0.04338EPSS
CVE
CVE
added 2005/08/23 4:0 a.m.88 views

CVE-2005-2491

Integer overflow in pcre_compile.c in Perl Compatible Regular Expressions (PCRE) before 6.2, as used in multiple products such as Python, Ethereal, and PHP, allows attackers to execute arbitrary code via quantifier values in regular expressions, which leads to a heap-based buffer overflow.

7.5CVSS9.9AI score0.01997EPSS
CVE
CVE
added 2016/12/13 4:59 p.m.87 views

CVE-2015-3210

Heap-based buffer overflow in PCRE 8.34 through 8.37 and PCRE2 10.10 allows remote attackers to execute arbitrary code via a crafted regular expression, as demonstrated by /^(?P=B)((?P=B)(?J:(?Pc)(?Pa(?P=B)))>WGXCREDITS)/, a different vulnerability than CVE-2015-8384.

9.8CVSS8.2AI score0.0573EPSS
CVE
CVE
added 2019/03/21 3:59 p.m.86 views

CVE-2017-16231

In PCRE 8.41, after compiling, a pcretest load test PoC produces a crash overflow in the function match() in pcre_exec.c because of a self-recursive call. NOTE: third parties dispute the relevance of this report, noting that there are options that can be used to limit the amount of stack that is us...

5.5CVSS5.7AI score0.00096EPSS
CVE
CVE
added 2007/11/14 9:46 p.m.79 views

CVE-2006-7228

Integer overflow in Perl-Compatible Regular Expression (PCRE) library before 6.7 might allow context-dependent attackers to execute arbitrary code via a regular expression that involves large (1) min, (2) max, or (3) duplength values that cause an incorrect length calculation and trigger a buffer o...

6.8CVSS9.9AI score
CVE
CVE
added 2007/11/07 11:46 p.m.74 views

CVE-2007-4768

Heap-based buffer overflow in Perl-Compatible Regular Expression (PCRE) library before 7.3 allows context-dependent attackers to execute arbitrary code via a singleton Unicode sequence in a character class in a regex pattern, which is incorrectly optimized.

6.8CVSS9.8AI score0.1241EPSS
CVE
CVE
added 2007/11/07 11:46 p.m.73 views

CVE-2007-4766

Multiple integer overflows in Perl-Compatible Regular Expression (PCRE) library before 7.3 allow context-dependent attackers to cause a denial of service (crash) or execute arbitrary code via unspecified escape (backslash) sequences.

7.5CVSS9.7AI score0.05109EPSS
CVE
CVE
added 2008/02/18 11:0 p.m.72 views

CVE-2008-0674

Buffer overflow in PCRE before 7.6 allows remote attackers to execute arbitrary code via a regular expression containing a character class with a large number of characters with Unicode code points greater than 255.

7.5CVSS9.8AI score0.23415EPSS
Web
CVE
CVE
added 2007/11/07 11:46 p.m.66 views

CVE-2007-1662

Perl-Compatible Regular Expression (PCRE) library before 7.3 reads past the end of the string when searching for unmatched brackets and parentheses, which allows context-dependent attackers to cause a denial of service (crash), possibly involving forward references.

5CVSS9.2AI score0.05385EPSS
CVE
CVE
added 2007/11/07 11:46 p.m.65 views

CVE-2007-1659

Perl-Compatible Regular Expression (PCRE) library before 7.3 allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via regex patterns containing unmatched "\Q\E" sequences with orphan "\E" codes.

6.8CVSS9.7AI score0.05344EPSS
CVE
CVE
added 2007/11/14 9:46 p.m.64 views

CVE-2006-7227

Integer overflow in Perl-Compatible Regular Expression (PCRE) library before 6.7 allows context-dependent attackers to execute arbitrary code via a regular expression containing a large number of named subpatterns (name_count) or long subpattern names (max_name_size), which triggers a buffer overfl...

6.8CVSS7.5AI score
CVE
CVE
added 2007/11/07 11:46 p.m.64 views

CVE-2007-1660

Perl-Compatible Regular Expression (PCRE) library before 7.0 does not properly calculate sizes for unspecified "multiple forms of character class", which triggers a buffer overflow that allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code.

6.8CVSS10AI score0.05628EPSS
CVE
CVE
added 2007/11/15 7:46 p.m.54 views

CVE-2006-7230

Perl-Compatible Regular Expression (PCRE) library before 7.0 does not properly calculate the amount of memory needed for a compiled regular expression pattern when the (1) -x or (2) -i UTF-8 options change within the pattern, which allows context-dependent attackers to cause a denial of service (PC...

4.3CVSS6AI score0.02478EPSS
CVE
CVE
added 2007/11/14 9:0 p.m.51 views

CVE-2005-4872

Perl-Compatible Regular Expression (PCRE) library before 6.2 does not properly count the number of named capturing subpatterns, which allows context-dependent attackers to cause a denial of service (crash) via a regular expression with a large number of named subpatterns, which triggers a buffer ov...

4.3CVSS6.3AI score
CVE
CVE
added 2007/11/07 11:46 p.m.50 views

CVE-2007-4767

Perl-Compatible Regular Expression (PCRE) library before 7.3 does not properly compute the length of (1) a \p sequence, (2) a \P sequence, or (3) a \P{x} sequence, which allows context-dependent attackers to cause a denial of service (infinite loop or crash) or execute arbitrary code.

5CVSS9.5AI score0.02611EPSS
CVE
CVE
added 2016/03/28 4:59 p.m.49 views

CVE-2014-9769

pcre_jit_compile.c in PCRE 8.35 does not properly use table jumps to optimize nested alternatives, which allows remote attackers to cause a denial of service (stack memory corruption) or possibly have unspecified other impact via a crafted string, as demonstrated by packets encountered by Suricata ...

7.5CVSS8.5AI score0.00934EPSS