Show filters
39 Total Results
Displaying 31-39 of 39
Sort by:
Attacker Value
Unknown

CVE-2006-7225

Disclosure Date: December 03, 2007 (last updated October 04, 2023)
Perl-Compatible Regular Expression (PCRE) library before 6.7 allows context-dependent attackers to cause a denial of service (error or crash) via a regular expression that involves a "malformed POSIX character class", as demonstrated via an invalid character after a [[ sequence.
0
Attacker Value
Unknown

CVE-2006-7230

Disclosure Date: November 15, 2007 (last updated October 04, 2023)
Perl-Compatible Regular Expression (PCRE) library before 7.0 does not properly calculate the amount of memory needed for a compiled regular expression pattern when the (1) -x or (2) -i UTF-8 options change within the pattern, which allows context-dependent attackers to cause a denial of service (PCRE or glibc crash) via crafted regular expressions.
0
Attacker Value
Unknown

CVE-2007-1659

Disclosure Date: November 07, 2007 (last updated October 04, 2023)
Perl-Compatible Regular Expression (PCRE) library before 7.3 allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via regex patterns containing unmatched "\Q\E" sequences with orphan "\E" codes.
0
Attacker Value
Unknown

CVE-2007-4766

Disclosure Date: November 07, 2007 (last updated October 04, 2023)
Multiple integer overflows in Perl-Compatible Regular Expression (PCRE) library before 7.3 allow context-dependent attackers to cause a denial of service (crash) or execute arbitrary code via unspecified escape (backslash) sequences.
0
Attacker Value
Unknown

CVE-2007-4767

Disclosure Date: November 07, 2007 (last updated October 04, 2023)
Perl-Compatible Regular Expression (PCRE) library before 7.3 does not properly compute the length of (1) a \p sequence, (2) a \P sequence, or (3) a \P{x} sequence, which allows context-dependent attackers to cause a denial of service (infinite loop or crash) or execute arbitrary code.
0
Attacker Value
Unknown

CVE-2007-1660

Disclosure Date: November 07, 2007 (last updated October 04, 2023)
Perl-Compatible Regular Expression (PCRE) library before 7.0 does not properly calculate sizes for unspecified "multiple forms of character class", which triggers a buffer overflow that allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code.
0
Attacker Value
Unknown

CVE-2007-1662

Disclosure Date: November 07, 2007 (last updated October 04, 2023)
Perl-Compatible Regular Expression (PCRE) library before 7.3 reads past the end of the string when searching for unmatched brackets and parentheses, which allows context-dependent attackers to cause a denial of service (crash), possibly involving forward references.
0
Attacker Value
Unknown

CVE-2007-4768

Disclosure Date: November 07, 2007 (last updated October 04, 2023)
Heap-based buffer overflow in Perl-Compatible Regular Expression (PCRE) library before 7.3 allows context-dependent attackers to execute arbitrary code via a singleton Unicode sequence in a character class in a regex pattern, which is incorrectly optimized.
0
Attacker Value
Unknown

CVE-2005-2491

Disclosure Date: August 23, 2005 (last updated February 22, 2025)
Integer overflow in pcre_compile.c in Perl Compatible Regular Expressions (PCRE) before 6.2, as used in multiple products such as Python, Ethereal, and PHP, allows attackers to execute arbitrary code via quantifier values in regular expressions, which leads to a heap-based buffer overflow.
0