Show filters
39 Total Results
Displaying 31-39 of 39
Sort by:
Attacker Value
Unknown
CVE-2006-7225
Disclosure Date: December 03, 2007 (last updated October 04, 2023)
Perl-Compatible Regular Expression (PCRE) library before 6.7 allows context-dependent attackers to cause a denial of service (error or crash) via a regular expression that involves a "malformed POSIX character class", as demonstrated via an invalid character after a [[ sequence.
0
Attacker Value
Unknown
CVE-2006-7230
Disclosure Date: November 15, 2007 (last updated October 04, 2023)
Perl-Compatible Regular Expression (PCRE) library before 7.0 does not properly calculate the amount of memory needed for a compiled regular expression pattern when the (1) -x or (2) -i UTF-8 options change within the pattern, which allows context-dependent attackers to cause a denial of service (PCRE or glibc crash) via crafted regular expressions.
0
Attacker Value
Unknown
CVE-2007-1659
Disclosure Date: November 07, 2007 (last updated October 04, 2023)
Perl-Compatible Regular Expression (PCRE) library before 7.3 allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via regex patterns containing unmatched "\Q\E" sequences with orphan "\E" codes.
0
Attacker Value
Unknown
CVE-2007-4766
Disclosure Date: November 07, 2007 (last updated October 04, 2023)
Multiple integer overflows in Perl-Compatible Regular Expression (PCRE) library before 7.3 allow context-dependent attackers to cause a denial of service (crash) or execute arbitrary code via unspecified escape (backslash) sequences.
0
Attacker Value
Unknown
CVE-2007-4767
Disclosure Date: November 07, 2007 (last updated October 04, 2023)
Perl-Compatible Regular Expression (PCRE) library before 7.3 does not properly compute the length of (1) a \p sequence, (2) a \P sequence, or (3) a \P{x} sequence, which allows context-dependent attackers to cause a denial of service (infinite loop or crash) or execute arbitrary code.
0
Attacker Value
Unknown
CVE-2007-1660
Disclosure Date: November 07, 2007 (last updated October 04, 2023)
Perl-Compatible Regular Expression (PCRE) library before 7.0 does not properly calculate sizes for unspecified "multiple forms of character class", which triggers a buffer overflow that allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code.
0
Attacker Value
Unknown
CVE-2007-1662
Disclosure Date: November 07, 2007 (last updated October 04, 2023)
Perl-Compatible Regular Expression (PCRE) library before 7.3 reads past the end of the string when searching for unmatched brackets and parentheses, which allows context-dependent attackers to cause a denial of service (crash), possibly involving forward references.
0
Attacker Value
Unknown
CVE-2007-4768
Disclosure Date: November 07, 2007 (last updated October 04, 2023)
Heap-based buffer overflow in Perl-Compatible Regular Expression (PCRE) library before 7.3 allows context-dependent attackers to execute arbitrary code via a singleton Unicode sequence in a character class in a regex pattern, which is incorrectly optimized.
0
Attacker Value
Unknown
CVE-2005-2491
Disclosure Date: August 23, 2005 (last updated February 22, 2025)
Integer overflow in pcre_compile.c in Perl Compatible Regular Expressions (PCRE) before 6.2, as used in multiple products such as Python, Ethereal, and PHP, allows attackers to execute arbitrary code via quantifier values in regular expressions, which leads to a heap-based buffer overflow.
0