Total vulnerabilities in the database
Integer overflow in the regcomp implementation in the Henry Spencer BSD regex library (aka rxspencer) alpha3.8.g5 on 32-bit platforms, as used in NetBSD through 6.1.5 and other products, might allow context-dependent attackers to execute arbitrary code via a large regular expression that leads to a heap-based buffer overflow.
Software | From | Fixed in |
---|---|---|
rxspencer_project / rxspencer | 3.8.g5 | 3.8.g5.x |
debian / debian_linux | 8.0 | 8.0.x |
debian / debian_linux | 7.0 | 7.0.x |
canonical / ubuntu_linux | 14.10 | 14.10.x |
canonical / ubuntu_linux | 15.04 | 15.04.x |
opensuse / opensuse | 13.1 | 13.1.x |
opensuse / opensuse | 13.2 | 13.2.x |
canonical / ubuntu_linux | 14.04 | 14.04.x |
canonical / ubuntu_linux | 10.04 | 10.04.x |
canonical / ubuntu_linux | 12.04 | 12.04.x |
php / php | 5.4.0 | 5.4.39 |
php / php | 5.5.0 | 5.5.23 |
php / php | 5.6.0 | 5.6.7 |