cve/2020/CVE-2020-14155.md

28 lines
1.1 KiB
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2020-14155](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14155)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
libpcre in PCRE before 8.44 allows an integer overflow via a large number after a (?C substring.
### POC
#### Reference
- https://www.oracle.com/security-alerts/cpuapr2022.html
#### Github
- https://github.com/ARPSyndicate/cvemon
- https://github.com/PajakAlexandre/wik-dps-tp02
- https://github.com/arindam0310018/04-Apr-2022-DevOps__Scan-Images-In-ACR-Using-Trivy
- https://github.com/binxio/gcr-kritis-signer
- https://github.com/dispera/giant-squid
- https://github.com/domyrtille/interview_project
- https://github.com/epequeno/devops-demo
- https://github.com/garethr/snykout
- https://github.com/nedenwalker/spring-boot-app-using-gradle
- https://github.com/nedenwalker/spring-boot-app-with-log4j-vuln
- https://github.com/onzack/trivy-multiscanner