Filtered by vendor Boost
Subscribe
Total
4 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2012-2677 | 1 Boost | 1 Pool | 2021-05-26 | 5.0 MEDIUM | N/A |
Integer overflow in the ordered_malloc function in boost/pool/pool.hpp in Boost Pool before 3.9 makes it easier for context-dependent attackers to perform memory-related attacks such as buffer overflows via a large memory chunk size value, which causes less memory to be allocated than expected. | |||||
CVE-2008-0172 | 2 Boost, Ubuntu | 2 Boost, Ubuntu Linux | 2018-10-15 | 5.0 MEDIUM | N/A |
The get_repeat_type function in basic_regex_creator.hpp in the Boost regex library (aka Boost.Regex) in Boost 1.33 and 1.34 allows context-dependent attackers to cause a denial of service (NULL dereference and crash) via an invalid regular expression. | |||||
CVE-2008-0171 | 1 Boost | 2 Boost, Boost Regex Library | 2018-10-15 | 5.0 MEDIUM | N/A |
regex/v4/perl_matcher_non_recursive.hpp in the Boost regex library (aka Boost.Regex) in Boost 1.33 and 1.34 allows context-dependent attackers to cause a denial of service (failed assertion and crash) via an invalid regular expression. | |||||
CVE-2013-0252 | 1 Boost | 1 Boost | 2013-12-04 | 5.0 MEDIUM | N/A |
boost::locale::utf::utf_traits in the Boost.Locale library in Boost 1.48 through 1.52 does not properly detect certain invalid UTF-8 sequences, which might allow remote attackers to bypass input validation protection mechanisms via crafted trailing bytes. |