Show plain JSON{"id": "CVE-2015-3210", "cveTags": [], "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 7.5, "accessVector": "NETWORK", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "authentication": "NONE", "integrityImpact": "PARTIAL", "accessComplexity": "LOW", "availabilityImpact": "PARTIAL", "confidentialityImpact": "PARTIAL"}, "acInsufInfo": false, "impactScore": 6.4, "baseSeverity": "HIGH", "obtainAllPrivilege": false, "exploitabilityScore": 10.0, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}], "cvssMetricV31": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 9.8, "attackVector": "NETWORK", "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "integrityImpact": "HIGH", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "HIGH", "privilegesRequired": "NONE", "confidentialityImpact": "HIGH"}, "impactScore": 5.9, "exploitabilityScore": 3.9}]}, "published": "2016-12-13T16:59:00.187", "references": [{"url": "http://rhn.redhat.com/errata/RHSA-2016-2750.html", "tags": ["Third Party Advisory"], "source": "secalert@redhat.com"}, {"url": "http://www.openwall.com/lists/oss-security/2015/06/01/7", "tags": ["Mailing List"], "source": "secalert@redhat.com"}, {"url": "http://www.openwall.com/lists/oss-security/2015/12/02/11", "tags": ["Mailing List"], "source": "secalert@redhat.com"}, {"url": "http://www.securityfocus.com/bid/74934", "tags": ["Broken Link", "Third Party Advisory", "VDB Entry"], "source": "secalert@redhat.com"}, {"url": "https://access.redhat.com/errata/RHSA-2016:1132", "tags": ["Third Party Advisory"], "source": "secalert@redhat.com"}, {"url": "https://bugs.exim.org/show_bug.cgi?id=1636", "tags": ["Exploit", "Issue Tracking", "Vendor Advisory"], "source": "secalert@redhat.com"}], "vulnStatus": "Analyzed", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-787"}]}], "descriptions": [{"lang": "en", "value": "Heap-based buffer overflow in PCRE 8.34 through 8.37 and PCRE2 10.10 allows remote attackers to execute arbitrary code via a crafted regular expression, as demonstrated by /^(?P=B)((?P=B)(?J:(?P<B>c)(?P<B>a(?P=B)))>WGXCREDITS)/, a different vulnerability than CVE-2015-8384."}, {"lang": "es", "value": "Desbordamiento de b\u00fafer basado en memoria din\u00e1mica en PCRE 8.34 hasta la versi\u00f3n 8.37 y PCRE2 10.10 permite a atacantes remotos ejecutar c\u00f3digo arbitrario a trav\u00e9s de una expresi\u00f3n regular manipulada, seg\u00fan lo demostrado por /^(?P=B)((?P=B)(?J:(?P\n<b>c)(?P<b>a(?P=B)))>WGXCREDITS)/, una vulnerabilidad diferente a CVE-2015-8384.</b></b>"}], "lastModified": "2023-12-20T18:28:46.977", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:pcre:pcre2:10.10:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E64C5505-F782-443F-944C-AC17B8468406"}], "operator": "OR"}]}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:pcre:pcre:8.34:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F6876A94-2609-41CE-975E-F1ADAE1BD782"}, {"criteria": "cpe:2.3:a:pcre:pcre:8.35:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9DA3CC4F-1797-46D8-8C3D-0605E71C5EAE"}, {"criteria": "cpe:2.3:a:pcre:pcre:8.36:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "909CD13B-E836-4EBF-9433-55B4EFFE2DC4"}, {"criteria": "cpe:2.3:a:pcre:pcre:8.37:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EF43E164-05C2-42A8-82CA-D1B643875C2B"}], "operator": "OR"}]}], "sourceIdentifier": "secalert@redhat.com"}