Show plain JSON{"id": "CVE-2015-2325", "cveTags": [], "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 6.8, "accessVector": "NETWORK", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "authentication": "NONE", "integrityImpact": "PARTIAL", "accessComplexity": "MEDIUM", "availabilityImpact": "PARTIAL", "confidentialityImpact": "PARTIAL"}, "acInsufInfo": false, "impactScore": 6.4, "baseSeverity": "MEDIUM", "obtainAllPrivilege": false, "exploitabilityScore": 8.6, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": true}], "cvssMetricV31": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 7.8, "attackVector": "LOCAL", "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "integrityImpact": "HIGH", "userInteraction": "REQUIRED", "attackComplexity": "LOW", "availabilityImpact": "HIGH", "privilegesRequired": "NONE", "confidentialityImpact": "HIGH"}, "impactScore": 5.9, "exploitabilityScore": 1.8}]}, "published": "2020-01-14T17:15:12.080", "references": [{"url": "http://lists.opensuse.org/opensuse-updates/2015-05/msg00014.html", "tags": ["Mailing List", "Third Party Advisory"], "source": "cve@mitre.org"}, {"url": "https://bugs.exim.org/show_bug.cgi?id=1591", "tags": ["Exploit", "Issue Tracking", "Permissions Required", "Third Party Advisory"], "source": "cve@mitre.org"}, {"url": "https://fortiguard.com/zeroday/FG-VD-15-015", "tags": ["Third Party Advisory"], "source": "cve@mitre.org"}, {"url": "https://www.pcre.org/original/changelog.txt", "tags": ["Release Notes", "Vendor Advisory"], "source": "cve@mitre.org"}], "vulnStatus": "Analyzed", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-125"}, {"lang": "en", "value": "CWE-787"}]}], "descriptions": [{"lang": "en", "value": "The compile_branch function in PCRE before 8.37 allows context-dependent attackers to compile incorrect code, cause a denial of service (out-of-bounds heap read and crash), or possibly have other unspecified impact via a regular expression with a group containing a forward reference repeated a large number of times within a repeated outer group that has a zero minimum quantifier."}, {"lang": "es", "value": "La funci\u00f3n compile_branch en PCRE versiones anteriores a 8.37, permite a atacantes dependiendo del contexto compilar c\u00f3digo incorrecto, causar una denegaci\u00f3n de servicio (lectura de la pila fuera de l\u00edmites y bloqueo) o posiblemente tener otro impacto no especificado por medio de una expresi\u00f3n regular con un grupo que contiene una referencia directa repetida una gran n\u00famero de veces dentro de un grupo externo repetido que posee un cuantificador m\u00ednimo cero."}], "lastModified": "2022-08-05T14:29:17.947", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:pcre:pcre:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "380663D5-622F-49F1-8BA2-5BC5D64EA947", "versionEndExcluding": "8.37"}], "operator": "OR"}]}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A10BC294-9196-425F-9FB0-B1625465B47F"}, {"criteria": "cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "03117DF1-3BEC-4B8D-AD63-DBBDB2126081"}], "operator": "OR"}]}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E7F2E36C-4FF9-4695-96F8-63B2F755A8B2", "versionEndExcluding": "10.0.18"}], "operator": "OR"}]}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "94FE4BDA-52E7-4E77-88E7-82058ECEF840", "versionEndExcluding": "5.4.41", "versionStartIncluding": "5.4.0"}, {"criteria": "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3573200F-9588-413E-90CB-E35C5A510D2C", "versionEndExcluding": "5.5.26", "versionStartIncluding": "5.5.0"}, {"criteria": "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3BBA8BEC-B2AF-43B2-BF75-0F6AEC5595BF", "versionEndExcluding": "5.6.9", "versionStartIncluding": "5.6.0"}], "operator": "OR"}]}], "sourceIdentifier": "cve@mitre.org"}