Search for packages
purl | pkg:nuget/pcre.symbols@8.32.0.1 |
Next non-vulnerable version | None. |
Latest non-vulnerable version | None. |
Risk | 4.4 |
Vulnerability | Summary | Fixed by |
---|---|---|
VCID-bktm-pb4k-aaap
Aliases: CVE-2017-8399 |
Improper Restriction of Operations within the Bounds of a Memory Buffer PCRE2 has an out-of-bounds write caused by a stack-based buffer overflow in pcre2_match.c, related to a "pattern with very many captures." | There are no reported fixed by versions. |
VCID-n3ub-krce-aaar
Aliases: CVE-2022-41409 |
Integer overflow vulnerability in pcre2test before 10.41 allows attackers to cause a denial of service or other unspecified impacts via negative input. | There are no reported fixed by versions. |
VCID-zghf-77cd-aaaj
Aliases: CVE-2016-3191 |
The compile_branch function in pcre_compile.c in PCRE 8.x before 8.39 and pcre2_compile.c in PCRE2 before 10.22 mishandles patterns containing an (*ACCEPT) substring in conjunction with nested parentheses, which allows remote attackers to execute arbitrary code or cause a denial of service (stack-based buffer overflow) via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror, aka ZDI-CAN-3542. | There are no reported fixed by versions. |
Vulnerability | Summary | Aliases |
---|---|---|
This package is not known to fix vulnerabilities. |