Total vulnerabilities in the database
PCRE 7.8 and 8.32 through 8.37, and PCRE2 10.10 mishandle group empty matches, which might allow remote attackers to cause a denial of service (stack-based buffer overflow) via a crafted regular expression, as demonstrated by /^(?:(?(1)\.|([^\\W_])?)+)+$/.
Software | From | Fixed in |
---|---|---|
pcre / pcre2 | 10.10 | 10.10.x |
pcre / pcre | 8.34 | 8.34.x |
pcre / pcre | 8.36 | 8.36.x |
pcre / pcre | 8.33 | 8.33.x |
pcre / pcre | 7.8 | 7.8.x |
pcre / pcre | 8.37 | 8.37.x |
pcre / pcre | 8.35 | 8.35.x |
pcre / pcre | 8.32 | 8.32.x |
ibm / powerkvm | 3.1 | 3.1.x |
ibm / powerkvm | 2.1 | 2.1.x |