The pcre_exec function in pcre_exec.c in PCRE before 8.38 mishandles a // pattern with a \01 string, which allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.
Cite this page
CVE-2015-8380. CVEDatabase.com. Retrieved 1 May 2026. https://cvedatabase.com/cve/CVE-2015-8380
Use CWE-119, Pcre vendor hub and Perl Compatible Regular Expression Library product page to widen CVE-2015-8380 into its surrounding weakness, vendor, and product context.
Compare it with CVE-2015-8394, CVE-2015-8390 and CVE-2015-8389 for nearby disclosures in the same product family.