Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-q6xr-rq9m-h889

Опубликовано: 01 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The gnu regular expression code in file 4.20 allows context-dependent attackers to cause a denial of service (CPU consumption) via a crafted document with a large number of line feed characters, which is not well handled by OS/2 REXX regular expressions that use wildcards, as originally reported for AMaViS.

The gnu regular expression code in file 4.20 allows context-dependent attackers to cause a denial of service (CPU consumption) via a crafted document with a large number of line feed characters, which is not well handled by OS/2 REXX regular expressions that use wildcards, as originally reported for AMaViS.

EPSS

Процентиль: 85%
0.027
Низкий

Связанные уязвимости

ubuntu
больше 18 лет назад

The gnu regular expression code in file 4.20 allows context-dependent attackers to cause a denial of service (CPU consumption) via a crafted document with a large number of line feed characters, which is not well handled by OS/2 REXX regular expressions that use wildcards, as originally reported for AMaViS.

nvd
больше 18 лет назад

The gnu regular expression code in file 4.20 allows context-dependent attackers to cause a denial of service (CPU consumption) via a crafted document with a large number of line feed characters, which is not well handled by OS/2 REXX regular expressions that use wildcards, as originally reported for AMaViS.

debian
больше 18 лет назад

The gnu regular expression code in file 4.20 allows context-dependent ...

fstec
больше 18 лет назад

Уязвимости операционной системы Gentoo Linux, позволяющие удаленному злоумышленнику нарушить доступность защищаемой информации

EPSS

Процентиль: 85%
0.027
Низкий