PCRE library is prone to a vulnerability which leads to Heap
	    Overflow. During the compilation of a malformed regular expression,
	    more data is written on the malloced block than the expected size
	    output by compile_regex. Exploits with advanced Heap Fengshui
	    techniques may allow an attacker to execute arbitrary code in the
	    context of the user running the affected application.
	  Latest version of PCRE is prone to a Heap Overflow vulnerability
	    which could caused by the following regular expression.
	  /(?J:(?|(:(?|(?'R')(\k'R')|((?'R')))H'Rk'Rf)|s(?'R'))))/