{"id":"CVE-2007-1958","details":"Buffer overflow in TinyMUX before 2.4 allows attackers to cause a denial of service via unspecified vectors related to \"too many substring matches in a regexp $-command.\" NOTE: some of these details are obtained from third party information.","modified":"2026-01-27T04:08:56.441812Z","published":"2007-04-11T10:19:00Z","withdrawn":"2026-01-27T04:08:56.441812Z","references":[{"type":"ADVISORY","url":"http://www.vupen.com/english/advisories/2007/1213"},{"type":"WEB","url":"http://www.tinymux.org/changes.txt"}],"schema_version":"1.7.3"}