Search for packages
| purl | pkg:nuget/pcre.symbols@8.32.0.7 |
| Next non-vulnerable version | None. |
| Latest non-vulnerable version | None. |
| Risk | 4.4 |
| Vulnerability | Summary | Fixed by |
|---|---|---|
|
VCID-eq8x-wkjr-zyf7
Aliases: CVE-2017-8399 |
Improper Restriction of Operations within the Bounds of a Memory Buffer PCRE2 has an out-of-bounds write caused by a stack-based buffer overflow in pcre2_match.c, related to a "pattern with very many captures." | There are no reported fixed by versions. |
|
VCID-puhw-2qwq-gqet
Aliases: CVE-2022-41409 |
Integer Overflow or Wraparound Integer overflow vulnerability in pcre2test before 10.41 allows attackers to cause a denial of service or other unspecified impacts via negative input. | There are no reported fixed by versions. |
|
VCID-udse-25e2-vfeb
Aliases: CVE-2016-3191 |
Improper Restriction of Operations within the Bounds of a Memory Buffer The compile_branch function in pcre_compile.c in PCRE and pcre2_compile.c in PCRE2 mishandles patterns containing an (*ACCEPT) substring in conjunction with nested parentheses, which allows remote attackers to execute arbitrary code or cause a denial of service (stack-based buffer overflow) via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror, aka ZDI-CAN-3542. | There are no reported fixed by versions. |
| Vulnerability | Summary | Aliases |
|---|---|---|
| This package is not known to fix vulnerabilities. | ||