Perl Compatible Regular Expression Library Pcre Perl Compatible Regular Expression Library

Don't miss out!

Thousands of developers use stack.watch to stay informed.
Get an email whenever new security vulnerabilities are reported in Pcre Perl Compatible Regular Expression Library.

By the Year

In 2026 there have been 0 vulnerabilities in Pcre Perl Compatible Regular Expression Library.

Year Vulnerabilities Average Score
2026 0 0.00

It may take a day or so for new Perl Compatible Regular Expression Library vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.

Recent Pcre Perl Compatible Regular Expression Library Security Vulnerabilities

PCRE before 8.38 mishandles the (?(<digits>) and (?(R<digits>) conditions, which
CVE-2015-8394 - December 02, 2015

PCRE before 8.38 mishandles the (?(<digits>) and (?(R<digits>) conditions, which allows remote attackers to cause a denial of service (integer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.

PCRE before 8.38 mishandles the [: and \\ substrings in character classes, which
CVE-2015-8390 - December 02, 2015

PCRE before 8.38 mishandles the [: and \\ substrings in character classes, which allows remote attackers to cause a denial of service (uninitialized memory read) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.

PCRE before 8.38 mishandles the /(?:|a|){100}x/ pattern and related patterns, which
CVE-2015-8389 - December 02, 2015

PCRE before 8.38 mishandles the /(?:|a|){100}x/ pattern and related patterns, which allows remote attackers to cause a denial of service (infinite recursion) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.

PCRE before 8.38 mishandles (?123) subroutine calls and related subroutine calls, which
CVE-2015-8387 - December 02, 2015

PCRE before 8.38 mishandles (?123) subroutine calls and related subroutine calls, which allows remote attackers to cause a denial of service (integer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.

PCRE before 8.38 mishandles the interaction of lookbehind assertions and mutually recursive subpatterns, which
CVE-2015-8386 - December 02, 2015

PCRE before 8.38 mishandles the interaction of lookbehind assertions and mutually recursive subpatterns, which allows remote attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.

PCRE before 8.38 mishandles certain repeated conditional groups, which
CVE-2015-8383 - December 02, 2015

PCRE before 8.38 mishandles certain repeated conditional groups, which allows remote attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.

pcregrep in PCRE before 8.38 mishandles the -q option for binary files, which might allow remote attackers to obtain sensitive information via a crafted file, as demonstrated by a CGI script
CVE-2015-8393 - December 02, 2015

pcregrep in PCRE before 8.38 mishandles the -q option for binary files, which might allow remote attackers to obtain sensitive information via a crafted file, as demonstrated by a CGI script that sends stdout data to a client.

Stay on top of Security Vulnerabilities

Want an email whenever new vulnerabilities are published for Pcre Perl Compatible Regular Expression Library or by Pcre? Click the Watch button to subscribe.

Pcre
Vendor

subscribe