Количество 11
Количество 11

CVE-2015-3217
PCRE 7.8 and 8.32 through 8.37, and PCRE2 10.10 mishandle group empty matches, which might allow remote attackers to cause a denial of service (stack-based buffer overflow) via a crafted regular expression, as demonstrated by /^(?:(?(1)\\.|([^\\\\W_])?)+)+$/.

CVE-2015-3217
PCRE 7.8 and 8.32 through 8.37, and PCRE2 10.10 mishandle group empty matches, which might allow remote attackers to cause a denial of service (stack-based buffer overflow) via a crafted regular expression, as demonstrated by /^(?:(?(1)\\.|([^\\\\W_])?)+)+$/.

CVE-2015-3217
PCRE 7.8 and 8.32 through 8.37, and PCRE2 10.10 mishandle group empty matches, which might allow remote attackers to cause a denial of service (stack-based buffer overflow) via a crafted regular expression, as demonstrated by /^(?:(?(1)\\.|([^\\\\W_])?)+)+$/.
CVE-2015-3217
PCRE 7.8 and 8.32 through 8.37, and PCRE2 10.10 mishandle group empty ...
GHSA-pv36-98fw-pc7h
PCRE 7.8 and 8.32 through 8.37, and PCRE2 10.10 mishandle group empty matches, which might allow remote attackers to cause a denial of service (stack-based buffer overflow) via a crafted regular expression, as demonstrated by /^(?:(?(1)\\.|([^\\\\W_])?)+)+$/.
ELSA-2016-1025
ELSA-2016-1025: pcre security update (IMPORTANT)

openSUSE-SU-2016:3099-1
Security update for pcre

SUSE-SU-2016:3161-1
Security update for pcre

SUSE-SU-2016:2971-1
Security update for pcre

SUSE-SU-2017:2699-1
Security update for SLES 12 Docker image

SUSE-SU-2017:2700-1
Security update for SLES 12-SP1 Docker image
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | CVE-2015-3217 PCRE 7.8 and 8.32 through 8.37, and PCRE2 10.10 mishandle group empty matches, which might allow remote attackers to cause a denial of service (stack-based buffer overflow) via a crafted regular expression, as demonstrated by /^(?:(?(1)\\.|([^\\\\W_])?)+)+$/. | CVSS3: 7.5 | 3% Низкий | больше 8 лет назад |
![]() | CVE-2015-3217 PCRE 7.8 and 8.32 through 8.37, and PCRE2 10.10 mishandle group empty matches, which might allow remote attackers to cause a denial of service (stack-based buffer overflow) via a crafted regular expression, as demonstrated by /^(?:(?(1)\\.|([^\\\\W_])?)+)+$/. | CVSS2: 4.3 | 3% Низкий | около 10 лет назад |
![]() | CVE-2015-3217 PCRE 7.8 and 8.32 through 8.37, and PCRE2 10.10 mishandle group empty matches, which might allow remote attackers to cause a denial of service (stack-based buffer overflow) via a crafted regular expression, as demonstrated by /^(?:(?(1)\\.|([^\\\\W_])?)+)+$/. | CVSS3: 7.5 | 3% Низкий | больше 8 лет назад |
CVE-2015-3217 PCRE 7.8 and 8.32 through 8.37, and PCRE2 10.10 mishandle group empty ... | CVSS3: 7.5 | 3% Низкий | больше 8 лет назад | |
GHSA-pv36-98fw-pc7h PCRE 7.8 and 8.32 through 8.37, and PCRE2 10.10 mishandle group empty matches, which might allow remote attackers to cause a denial of service (stack-based buffer overflow) via a crafted regular expression, as demonstrated by /^(?:(?(1)\\.|([^\\\\W_])?)+)+$/. | CVSS3: 7.5 | 3% Низкий | около 3 лет назад | |
ELSA-2016-1025 ELSA-2016-1025: pcre security update (IMPORTANT) | около 9 лет назад | |||
![]() | openSUSE-SU-2016:3099-1 Security update for pcre | больше 8 лет назад | ||
![]() | SUSE-SU-2016:3161-1 Security update for pcre | больше 8 лет назад | ||
![]() | SUSE-SU-2016:2971-1 Security update for pcre | больше 8 лет назад | ||
![]() | SUSE-SU-2017:2699-1 Security update for SLES 12 Docker image | больше 7 лет назад | ||
![]() | SUSE-SU-2017:2700-1 Security update for SLES 12-SP1 Docker image | больше 7 лет назад |
Уязвимостей на страницу