Логотип exploitDog
bind:"CVE-2006-7230" OR bind:"CVE-2006-7228" OR bind:"CVE-2006-7226" OR bind:"CVE-2006-7225"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2006-7230" OR bind:"CVE-2006-7228" OR bind:"CVE-2006-7226" OR bind:"CVE-2006-7225"

Количество 25

Количество 25

oracle-oval логотип

ELSA-2007-1059

больше 17 лет назад

ELSA-2007-1059: Important: pcre security update (IMPORTANT)

EPSS: Низкий
ubuntu логотип

CVE-2006-7230

больше 17 лет назад

Perl-Compatible Regular Expression (PCRE) library before 7.0 does not properly calculate the amount of memory needed for a compiled regular expression pattern when the (1) -x or (2) -i UTF-8 options change within the pattern, which allows context-dependent attackers to cause a denial of service (PCRE or glibc crash) via crafted regular expressions.

CVSS2: 4.3
EPSS: Низкий
redhat логотип

CVE-2006-7230

больше 17 лет назад

Perl-Compatible Regular Expression (PCRE) library before 7.0 does not properly calculate the amount of memory needed for a compiled regular expression pattern when the (1) -x or (2) -i UTF-8 options change within the pattern, which allows context-dependent attackers to cause a denial of service (PCRE or glibc crash) via crafted regular expressions.

EPSS: Низкий
nvd логотип

CVE-2006-7230

больше 17 лет назад

Perl-Compatible Regular Expression (PCRE) library before 7.0 does not properly calculate the amount of memory needed for a compiled regular expression pattern when the (1) -x or (2) -i UTF-8 options change within the pattern, which allows context-dependent attackers to cause a denial of service (PCRE or glibc crash) via crafted regular expressions.

CVSS2: 4.3
EPSS: Низкий
debian логотип

CVE-2006-7230

больше 17 лет назад

Perl-Compatible Regular Expression (PCRE) library before 7.0 does not ...

CVSS2: 4.3
EPSS: Низкий
fstec логотип

BDU:2015-04725

больше 10 лет назад

Уязвимости операционной системы SUSE Linux Enterprise, позволяющие злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации

CVSS2: 7.5
EPSS: Низкий
fstec логотип

BDU:2015-04724

больше 10 лет назад

Уязвимости операционной системы SUSE Linux Enterprise, позволяющие злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации

CVSS2: 7.5
EPSS: Низкий
fstec логотип

BDU:2015-04723

больше 19 лет назад

Уязвимости операционной системы SUSE Linux Enterprise, позволяющие злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации

CVSS2: 7.5
EPSS: Низкий
fstec логотип

BDU:2015-09569

больше 17 лет назад

Уязвимости операционной системы Gentoo Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации

CVSS2: 7.5
EPSS: Низкий
github логотип

GHSA-64q5-vm73-jhjp

около 3 лет назад

Perl-Compatible Regular Expression (PCRE) library before 7.0 does not properly calculate the amount of memory needed for a compiled regular expression pattern when the (1) -x or (2) -i UTF-8 options change within the pattern, which allows context-dependent attackers to cause a denial of service (PCRE or glibc crash) via crafted regular expressions.

EPSS: Низкий
ubuntu логотип

CVE-2006-7228

больше 17 лет назад

Integer overflow in Perl-Compatible Regular Expression (PCRE) library before 6.7 might allow context-dependent attackers to execute arbitrary code via a regular expression that involves large (1) min, (2) max, or (3) duplength values that cause an incorrect length calculation and trigger a buffer overflow, a different vulnerability than CVE-2006-7227. NOTE: this issue was originally subsumed by CVE-2006-7224, but that CVE has been REJECTED and split.

CVSS2: 6.8
EPSS: Низкий
redhat логотип

CVE-2006-7228

больше 17 лет назад

Integer overflow in Perl-Compatible Regular Expression (PCRE) library before 6.7 might allow context-dependent attackers to execute arbitrary code via a regular expression that involves large (1) min, (2) max, or (3) duplength values that cause an incorrect length calculation and trigger a buffer overflow, a different vulnerability than CVE-2006-7227. NOTE: this issue was originally subsumed by CVE-2006-7224, but that CVE has been REJECTED and split.

EPSS: Низкий
nvd логотип

CVE-2006-7228

больше 17 лет назад

Integer overflow in Perl-Compatible Regular Expression (PCRE) library before 6.7 might allow context-dependent attackers to execute arbitrary code via a regular expression that involves large (1) min, (2) max, or (3) duplength values that cause an incorrect length calculation and trigger a buffer overflow, a different vulnerability than CVE-2006-7227. NOTE: this issue was originally subsumed by CVE-2006-7224, but that CVE has been REJECTED and split.

CVSS2: 6.8
EPSS: Низкий
debian логотип

CVE-2006-7228

больше 17 лет назад

Integer overflow in Perl-Compatible Regular Expression (PCRE) library ...

CVSS2: 6.8
EPSS: Низкий
github логотип

GHSA-hw27-4fxg-c8f3

около 3 лет назад

Integer overflow in Perl-Compatible Regular Expression (PCRE) library before 6.7 might allow context-dependent attackers to execute arbitrary code via a regular expression that involves large (1) min, (2) max, or (3) duplength values that cause an incorrect length calculation and trigger a buffer overflow, a different vulnerability than CVE-2006-7227. NOTE: this issue was originally subsumed by CVE-2006-7224, but that CVE has been REJECTED and split.

EPSS: Низкий
ubuntu логотип

CVE-2006-7226

больше 17 лет назад

Perl-Compatible Regular Expression (PCRE) library before 6.7 does not properly calculate the compiled memory allocation for regular expressions that involve a quantified "subpattern containing a named recursion or subroutine reference," which allows context-dependent attackers to cause a denial of service (error or crash).

CVSS2: 4.3
EPSS: Низкий
redhat логотип

CVE-2006-7226

больше 17 лет назад

Perl-Compatible Regular Expression (PCRE) library before 6.7 does not properly calculate the compiled memory allocation for regular expressions that involve a quantified "subpattern containing a named recursion or subroutine reference," which allows context-dependent attackers to cause a denial of service (error or crash).

EPSS: Низкий
nvd логотип

CVE-2006-7226

больше 17 лет назад

Perl-Compatible Regular Expression (PCRE) library before 6.7 does not properly calculate the compiled memory allocation for regular expressions that involve a quantified "subpattern containing a named recursion or subroutine reference," which allows context-dependent attackers to cause a denial of service (error or crash).

CVSS2: 4.3
EPSS: Низкий
debian логотип

CVE-2006-7226

больше 17 лет назад

Perl-Compatible Regular Expression (PCRE) library before 6.7 does not ...

CVSS2: 4.3
EPSS: Низкий
ubuntu логотип

CVE-2006-7225

больше 17 лет назад

Perl-Compatible Regular Expression (PCRE) library before 6.7 allows context-dependent attackers to cause a denial of service (error or crash) via a regular expression that involves a "malformed POSIX character class", as demonstrated via an invalid character after a [[ sequence.

CVSS2: 4.3
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
oracle-oval логотип
ELSA-2007-1059

ELSA-2007-1059: Important: pcre security update (IMPORTANT)

больше 17 лет назад
ubuntu логотип
CVE-2006-7230

Perl-Compatible Regular Expression (PCRE) library before 7.0 does not properly calculate the amount of memory needed for a compiled regular expression pattern when the (1) -x or (2) -i UTF-8 options change within the pattern, which allows context-dependent attackers to cause a denial of service (PCRE or glibc crash) via crafted regular expressions.

CVSS2: 4.3
2%
Низкий
больше 17 лет назад
redhat логотип
CVE-2006-7230

Perl-Compatible Regular Expression (PCRE) library before 7.0 does not properly calculate the amount of memory needed for a compiled regular expression pattern when the (1) -x or (2) -i UTF-8 options change within the pattern, which allows context-dependent attackers to cause a denial of service (PCRE or glibc crash) via crafted regular expressions.

2%
Низкий
больше 17 лет назад
nvd логотип
CVE-2006-7230

Perl-Compatible Regular Expression (PCRE) library before 7.0 does not properly calculate the amount of memory needed for a compiled regular expression pattern when the (1) -x or (2) -i UTF-8 options change within the pattern, which allows context-dependent attackers to cause a denial of service (PCRE or glibc crash) via crafted regular expressions.

CVSS2: 4.3
2%
Низкий
больше 17 лет назад
debian логотип
CVE-2006-7230

Perl-Compatible Regular Expression (PCRE) library before 7.0 does not ...

CVSS2: 4.3
2%
Низкий
больше 17 лет назад
fstec логотип
BDU:2015-04725

Уязвимости операционной системы SUSE Linux Enterprise, позволяющие злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации

CVSS2: 7.5
больше 10 лет назад
fstec логотип
BDU:2015-04724

Уязвимости операционной системы SUSE Linux Enterprise, позволяющие злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации

CVSS2: 7.5
больше 10 лет назад
fstec логотип
BDU:2015-04723

Уязвимости операционной системы SUSE Linux Enterprise, позволяющие злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации

CVSS2: 7.5
больше 19 лет назад
fstec логотип
BDU:2015-09569

Уязвимости операционной системы Gentoo Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации

CVSS2: 7.5
больше 17 лет назад
github логотип
GHSA-64q5-vm73-jhjp

Perl-Compatible Regular Expression (PCRE) library before 7.0 does not properly calculate the amount of memory needed for a compiled regular expression pattern when the (1) -x or (2) -i UTF-8 options change within the pattern, which allows context-dependent attackers to cause a denial of service (PCRE or glibc crash) via crafted regular expressions.

2%
Низкий
около 3 лет назад
ubuntu логотип
CVE-2006-7228

Integer overflow in Perl-Compatible Regular Expression (PCRE) library before 6.7 might allow context-dependent attackers to execute arbitrary code via a regular expression that involves large (1) min, (2) max, or (3) duplength values that cause an incorrect length calculation and trigger a buffer overflow, a different vulnerability than CVE-2006-7227. NOTE: this issue was originally subsumed by CVE-2006-7224, but that CVE has been REJECTED and split.

CVSS2: 6.8
3%
Низкий
больше 17 лет назад
redhat логотип
CVE-2006-7228

Integer overflow in Perl-Compatible Regular Expression (PCRE) library before 6.7 might allow context-dependent attackers to execute arbitrary code via a regular expression that involves large (1) min, (2) max, or (3) duplength values that cause an incorrect length calculation and trigger a buffer overflow, a different vulnerability than CVE-2006-7227. NOTE: this issue was originally subsumed by CVE-2006-7224, but that CVE has been REJECTED and split.

3%
Низкий
больше 17 лет назад
nvd логотип
CVE-2006-7228

Integer overflow in Perl-Compatible Regular Expression (PCRE) library before 6.7 might allow context-dependent attackers to execute arbitrary code via a regular expression that involves large (1) min, (2) max, or (3) duplength values that cause an incorrect length calculation and trigger a buffer overflow, a different vulnerability than CVE-2006-7227. NOTE: this issue was originally subsumed by CVE-2006-7224, but that CVE has been REJECTED and split.

CVSS2: 6.8
3%
Низкий
больше 17 лет назад
debian логотип
CVE-2006-7228

Integer overflow in Perl-Compatible Regular Expression (PCRE) library ...

CVSS2: 6.8
3%
Низкий
больше 17 лет назад
github логотип
GHSA-hw27-4fxg-c8f3

Integer overflow in Perl-Compatible Regular Expression (PCRE) library before 6.7 might allow context-dependent attackers to execute arbitrary code via a regular expression that involves large (1) min, (2) max, or (3) duplength values that cause an incorrect length calculation and trigger a buffer overflow, a different vulnerability than CVE-2006-7227. NOTE: this issue was originally subsumed by CVE-2006-7224, but that CVE has been REJECTED and split.

3%
Низкий
около 3 лет назад
ubuntu логотип
CVE-2006-7226

Perl-Compatible Regular Expression (PCRE) library before 6.7 does not properly calculate the compiled memory allocation for regular expressions that involve a quantified "subpattern containing a named recursion or subroutine reference," which allows context-dependent attackers to cause a denial of service (error or crash).

CVSS2: 4.3
2%
Низкий
больше 17 лет назад
redhat логотип
CVE-2006-7226

Perl-Compatible Regular Expression (PCRE) library before 6.7 does not properly calculate the compiled memory allocation for regular expressions that involve a quantified "subpattern containing a named recursion or subroutine reference," which allows context-dependent attackers to cause a denial of service (error or crash).

2%
Низкий
больше 17 лет назад
nvd логотип
CVE-2006-7226

Perl-Compatible Regular Expression (PCRE) library before 6.7 does not properly calculate the compiled memory allocation for regular expressions that involve a quantified "subpattern containing a named recursion or subroutine reference," which allows context-dependent attackers to cause a denial of service (error or crash).

CVSS2: 4.3
2%
Низкий
больше 17 лет назад
debian логотип
CVE-2006-7226

Perl-Compatible Regular Expression (PCRE) library before 6.7 does not ...

CVSS2: 4.3
2%
Низкий
больше 17 лет назад
ubuntu логотип
CVE-2006-7225

Perl-Compatible Regular Expression (PCRE) library before 6.7 allows context-dependent attackers to cause a denial of service (error or crash) via a regular expression that involves a "malformed POSIX character class", as demonstrated via an invalid character after a [[ sequence.

CVSS2: 4.3
1%
Низкий
больше 17 лет назад

Уязвимостей на страницу