RSS   Vulnerabilities for
'Perl-compatible regular expression library'
   RSS

2014-12-16
 
CVE-2014-8964

 

 
Heap-based buffer overflow in PCRE 8.36 and earlier allows remote attackers to cause a denial of service (crash) or have other unspecified impact via a crafted regular expression, related to an assertion that allows zero repeats.

 
2007-11-07
 
CVE-2007-1661

CWE-Other
 

 
Perl-Compatible Regular Expression (PCRE) library before 7.3 backtracks too far when matching certain input bytes against some regex patterns in non-UTF-8 mode, which allows context-dependent attackers to obtain sensitive information or cause a denial of service (crash), as demonstrated by the "\X?\d" and "\P{L}?\d" patterns.

 

 >>> Vendor: PCRE 5 Products
PCRE
Perl-compatible regular expression library
Perl compatible regular expression library
Pcre2
Libpcre


Copyright 2024, cxsecurity.com

 

Back to Top