Max CVSS | 6.8 | Min CVSS | 4.3 | Total Count | 2 |
ID | CVSS | Summary | Last (major) update | Published | |
CVE-2006-7228 | 6.8 |
Integer overflow in Perl-Compatible Regular Expression (PCRE) library before 6.7 might allow context-dependent attackers to execute arbitrary code via a regular expression that involves large (1) min, (2) max, or (3) duplength values that cause an in
|
13-02-2023 - 02:17 | 14-11-2007 - 21:46 | |
CVE-2006-7227 | 6.8 |
Integer overflow in Perl-Compatible Regular Expression (PCRE) library before 6.7 allows context-dependent attackers to execute arbitrary code via a regular expression containing a large number of named subpatterns (name_count) or long subpattern name
|
13-02-2023 - 02:17 | 14-11-2007 - 21:46 | |
CVE-2005-4872 | 4.3 |
Perl-Compatible Regular Expression (PCRE) library before 6.2 does not properly count the number of named capturing subpatterns, which allows context-dependent attackers to cause a denial of service (crash) via a regular expression with a large number
|
13-02-2023 - 02:16 | 31-12-2005 - 05:00 | |
CVE-2007-1659 | 6.8 |
Perl-Compatible Regular Expression (PCRE) library before 7.3 allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via regex patterns containing unmatched "\Q\E" sequences with orphan "\E" codes.
|
16-10-2018 - 16:39 | 07-11-2007 - 23:46 | |
CVE-2006-7226 | 4.3 |
Perl-Compatible Regular Expression (PCRE) library before 6.7 does not properly calculate the compiled memory allocation for regular expressions that involve a quantified "subpattern containing a named recursion or subroutine reference," which allows
|
11-10-2017 - 01:31 | 03-12-2007 - 20:46 | |
CVE-2006-7230 | 4.3 |
Perl-Compatible Regular Expression (PCRE) library before 7.0 does not properly calculate the amount of memory needed for a compiled regular expression pattern when the (1) -x or (2) -i UTF-8 options change within the pattern, which allows context-dep
|
11-10-2017 - 01:31 | 15-11-2007 - 19:46 | |
CVE-2006-7225 | 4.3 |
Perl-Compatible Regular Expression (PCRE) library before 6.7 allows context-dependent attackers to cause a denial of service (error or crash) via a regular expression that involves a "malformed POSIX character class", as demonstrated via an invalid c
|
11-10-2017 - 01:31 | 03-12-2007 - 20:46 |