Vulnerabilities
Vulnerable Software

Vulnerability Details CVE-2008-0674

Buffer overflow in PCRE before 7.6 allows remote attackers to execute arbitrary code via a regular expression containing a character class with a large number of characters with Unicode code points greater than 255.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.234
EPSS Ranking 95.6%
CVSS Severity
CVSS v2 Score 7.5
References
Products affected by CVE-2008-0674
  • Pcre » Pcre » Version: 1.00
    cpe:2.3:a:pcre:pcre:1.00
  • Pcre » Pcre » Version: 1.01
    cpe:2.3:a:pcre:pcre:1.01
  • Pcre » Pcre » Version: 1.02
    cpe:2.3:a:pcre:pcre:1.02
  • Pcre » Pcre » Version: 1.03
    cpe:2.3:a:pcre:pcre:1.03
  • Pcre » Pcre » Version: 1.04
    cpe:2.3:a:pcre:pcre:1.04
  • Pcre » Pcre » Version: 1.05
    cpe:2.3:a:pcre:pcre:1.05
  • Pcre » Pcre » Version: 1.06
    cpe:2.3:a:pcre:pcre:1.06
  • Pcre » Pcre » Version: 1.07
    cpe:2.3:a:pcre:pcre:1.07
  • Pcre » Pcre » Version: 1.08
    cpe:2.3:a:pcre:pcre:1.08
  • Pcre » Pcre » Version: 1.09
    cpe:2.3:a:pcre:pcre:1.09
  • Pcre » Pcre » Version: 2.00
    cpe:2.3:a:pcre:pcre:2.00
  • Pcre » Pcre » Version: 2.01
    cpe:2.3:a:pcre:pcre:2.01
  • Pcre » Pcre » Version: 2.02
    cpe:2.3:a:pcre:pcre:2.02
  • Pcre » Pcre » Version: 2.03
    cpe:2.3:a:pcre:pcre:2.03
  • Pcre » Pcre » Version: 2.04
    cpe:2.3:a:pcre:pcre:2.04
  • Pcre » Pcre » Version: 2.05
    cpe:2.3:a:pcre:pcre:2.05
  • Pcre » Pcre » Version: 2.06
    cpe:2.3:a:pcre:pcre:2.06
  • Pcre » Pcre » Version: 2.07
    cpe:2.3:a:pcre:pcre:2.07
  • Pcre » Pcre » Version: 2.08
    cpe:2.3:a:pcre:pcre:2.08
  • Pcre » Pcre » Version: 2.08a
    cpe:2.3:a:pcre:pcre:2.08a
  • Pcre » Pcre » Version: 3.0
    cpe:2.3:a:pcre:pcre:3.0
  • Pcre » Pcre » Version: 3.1
    cpe:2.3:a:pcre:pcre:3.1
  • Pcre » Pcre » Version: 3.2
    cpe:2.3:a:pcre:pcre:3.2
  • Pcre » Pcre » Version: 3.3
    cpe:2.3:a:pcre:pcre:3.3
  • Pcre » Pcre » Version: 3.4
    cpe:2.3:a:pcre:pcre:3.4
  • Pcre » Pcre » Version: 3.5
    cpe:2.3:a:pcre:pcre:3.5
  • Pcre » Pcre » Version: 3.6
    cpe:2.3:a:pcre:pcre:3.6
  • Pcre » Pcre » Version: 3.7
    cpe:2.3:a:pcre:pcre:3.7
  • Pcre » Pcre » Version: 3.8
    cpe:2.3:a:pcre:pcre:3.8
  • Pcre » Pcre » Version: 3.9
    cpe:2.3:a:pcre:pcre:3.9
  • Pcre » Pcre » Version: 4.0
    cpe:2.3:a:pcre:pcre:4.0
  • Pcre » Pcre » Version: 4.1
    cpe:2.3:a:pcre:pcre:4.1
  • Pcre » Pcre » Version: 4.2
    cpe:2.3:a:pcre:pcre:4.2
  • Pcre » Pcre » Version: 4.3
    cpe:2.3:a:pcre:pcre:4.3
  • Pcre » Pcre » Version: 4.4
    cpe:2.3:a:pcre:pcre:4.4
  • Pcre » Pcre » Version: 4.5
    cpe:2.3:a:pcre:pcre:4.5
  • Pcre » Pcre » Version: 5.0
    cpe:2.3:a:pcre:pcre:5.0
  • Pcre » Pcre » Version: 6.0
    cpe:2.3:a:pcre:pcre:6.0
  • Pcre » Pcre » Version: 6.1
    cpe:2.3:a:pcre:pcre:6.1
  • Pcre » Pcre » Version: 6.2
    cpe:2.3:a:pcre:pcre:6.2
  • Pcre » Pcre » Version: 6.3
    cpe:2.3:a:pcre:pcre:6.3
  • Pcre » Pcre » Version: 6.4
    cpe:2.3:a:pcre:pcre:6.4
  • Pcre » Pcre » Version: 6.5
    cpe:2.3:a:pcre:pcre:6.5
  • Pcre » Pcre » Version: 6.6
    cpe:2.3:a:pcre:pcre:6.6
  • Pcre » Pcre » Version: 6.7
    cpe:2.3:a:pcre:pcre:6.7
  • Pcre » Pcre » Version: 7.0
    cpe:2.3:a:pcre:pcre:7.0
  • Pcre » Pcre » Version: 7.1
    cpe:2.3:a:pcre:pcre:7.1
  • Pcre » Pcre » Version: 7.2
    cpe:2.3:a:pcre:pcre:7.2
  • Pcre » Pcre » Version: 7.3
    cpe:2.3:a:pcre:pcre:7.3
  • Pcre » Pcre » Version: 7.4
    cpe:2.3:a:pcre:pcre:7.4
  • Pcre » Pcre » Version: 7.5
    cpe:2.3:a:pcre:pcre:7.5


Contact Us

Shodan ® - All rights reserved