Pcre Pcre2 vulnerabilities
11 known vulnerabilities affecting pcre/pcre2.
Total CVEs
11
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
CRITICAL6HIGH4MEDIUM1
Vulnerabilities
Page 1 of 1
CVE-2025-58050MEDIUMCVSS 6.9v10.452025-08-27
CVE-2025-58050 [MEDIUM] CWE-122 CVE-2025-58050: The PCRE2 library is a set of C functions that implement regular expression pattern matching. In ver
The PCRE2 library is a set of C functions that implement regular expression pattern matching. In version 10.45, a heap-buffer-overflow read vulnerability exists in the PCRE2 regular expression matching engine, specifically within the handling of the (*scs:...) (Scan SubString) verb when combined with (*ACCEPT) in src/pcre2_match.c. This vulnerabilit
nvd
CVE-2022-41409HIGHCVSS 7.5fixed in 10.412023-07-18
CVE-2022-41409 [HIGH] CWE-190 CVE-2022-41409: Integer overflow vulnerability in pcre2test before 10.41 allows attackers to cause a denial of servi
Integer overflow vulnerability in pcre2test before 10.41 allows attackers to cause a denial of service or other unspecified impacts via negative input.
nvd
CVE-2022-1587CRITICALCVSS 9.1fixed in 10.402022-05-16
CVE-2022-1587 [CRITICAL] CWE-125 CVE-2022-1587: An out-of-bounds read vulnerability was discovered in the PCRE2 library in the get_recurse_data_leng
An out-of-bounds read vulnerability was discovered in the PCRE2 library in the get_recurse_data_length() function of the pcre2_jit_compile.c file. This issue affects recursions in JIT-compiled regular expressions caused by duplicate data transfers.
nvd
CVE-2022-1586CRITICALCVSS 9.1fixed in 10.402022-05-16
CVE-2022-1586 [CRITICAL] CWE-125 CVE-2022-1586: An out-of-bounds read vulnerability was discovered in the PCRE2 library in the compile_xclass_matchi
An out-of-bounds read vulnerability was discovered in the PCRE2 library in the compile_xclass_matchingpath() function of the pcre2_jit_compile.c file. This involves a unicode property matching issue in JIT-compiled regular expressions. The issue occurs because the character was not fully read in case-less matching within JIT.
nvd
CVE-2019-20454HIGHCVSS 7.5≥ 10.31, < 10.342020-02-14
CVE-2019-20454 [HIGH] CWE-125 CVE-2019-20454: An out-of-bounds read was discovered in PCRE before 10.34 when the pattern \X is JIT compiled and us
An out-of-bounds read was discovered in PCRE before 10.34 when the pattern \X is JIT compiled and used to match specially crafted subjects in non-UTF mode. Applications that use PCRE to parse untrusted input may be vulnerable to this flaw, which would allow an attacker to crash the application. The flaw occurs in do_extuni_no_utf in pcre2_jit_compile.
nvd
CVE-2017-8786CRITICALCVSS 9.8v10.232017-05-05
CVE-2017-8786 [CRITICAL] CWE-119 CVE-2017-8786: pcre2test.c in PCRE2 10.23 allows remote attackers to cause a denial of service (heap-based buffer o
pcre2test.c in PCRE2 10.23 allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via a crafted regular expression.
nvd
CVE-2017-8399CRITICALCVSS 9.8fixed in 10.302017-05-01
CVE-2017-8399 [CRITICAL] CWE-119 CVE-2017-8399: PCRE2 before 10.30 has an out-of-bounds write caused by a stack-based buffer overflow in pcre2_match
PCRE2 before 10.30 has an out-of-bounds write caused by a stack-based buffer overflow in pcre2_match.c, related to a "pattern with very many captures."
nvd
CVE-2017-7186HIGHCVSS 7.5v10.232017-03-20
CVE-2017-7186 [HIGH] CWE-119 CVE-2017-7186: libpcre1 in PCRE 8.40 and libpcre2 in PCRE2 10.23 allow remote attackers to cause a denial of servic
libpcre1 in PCRE 8.40 and libpcre2 in PCRE2 10.23 allow remote attackers to cause a denial of service (segmentation violation for read access, and application crash) by triggering an invalid Unicode property lookup.
nvd
CVE-2015-3210CRITICALCVSS 9.8v10.102016-12-13
CVE-2015-3210 [CRITICAL] CWE-787 CVE-2015-3210: Heap-based buffer overflow in PCRE 8.34 through 8.37 and PCRE2 10.10 allows remote attackers to exec
Heap-based buffer overflow in PCRE 8.34 through 8.37 and PCRE2 10.10 allows remote attackers to execute arbitrary code via a crafted regular expression, as demonstrated by /^(?P=B)((?P=B)(?J:(?Pc)(?Pa(?P=B)))>WGXCREDITS)/, a different vulnerability than CVE-2015-8384.
nvd
CVE-2015-3217HIGHCVSS 7.5v10.102016-12-13
CVE-2015-3217 [HIGH] CWE-119 CVE-2015-3217: PCRE 7.8 and 8.32 through 8.37, and PCRE2 10.10 mishandle group empty matches, which might allow rem
PCRE 7.8 and 8.32 through 8.37, and PCRE2 10.10 mishandle group empty matches, which might allow remote attackers to cause a denial of service (stack-based buffer overflow) via a crafted regular expression, as demonstrated by /^(?:(?(1)\\.|([^\\\\W_])?)+)+$/.
nvd
CVE-2016-3191CRITICALCVSS 9.8≤ 10.212016-03-17
CVE-2016-3191 [CRITICAL] CWE-119 CVE-2016-3191: The compile_branch function in pcre_compile.c in PCRE 8.x before 8.39 and pcre2_compile.c in PCRE2 b
The compile_branch function in pcre_compile.c in PCRE 8.x before 8.39 and pcre2_compile.c in PCRE2 before 10.22 mishandles patterns containing an (*ACCEPT) substring in conjunction with nested parentheses, which allows remote attackers to execute arbitrary code or cause a denial of service (stack-based buffer overflow) via a crafted regular expressi
nvd