漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
漏洞
N/A
漏洞信息
The compile_regex function in pcre_compile.c in PCRE before 8.38 and pcre2_compile.c in PCRE2 before 10.2x mishandles the /(?J:(?|(:(?|(?'R')(\k'R')|((?'R')))H'Rk'Rf)|s(?'R'))))/ and /(?J:(?|(:(?|(?'R')(\z(?|(?'R')(\k'R')|((?'R')))k'R')|((?'R')))H'Ak'Rf)|s(?'R')))/ patterns, and related patterns with certain group references, which allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.
漏洞信息
N/A
漏洞
N/A
漏洞
PCRE2和PCRE 缓冲区溢出漏洞
漏洞信息
PCRE(Perl Compatible Regular Expressions)和PCRE2都是软件开发者Philip Hazel所研发的产品。前者是一个使用C语言编写的开源正则表达式函数库,后者是一个用于修改PCRE的API。 PCRE2 10.2x之前版本的pcre2_compile.c文件和PCRE 8.38之前版本的pcre_compile.c文件中的‘compile_regex’函数存在安全漏洞,该漏洞源于程序没有正确处理‘/(?J:(?|(:(?|(?'R')(\k'R')|((?'R'))
漏洞信息
N/A
漏洞
N/A