Filtered by vendor Email\
Subscribe
Total
4 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2018-12558 | 1 Email\ | 1 \ | 2024-02-04 | 5.0 MEDIUM | 7.5 HIGH |
The parse() method in the Email::Address module through 1.909 for Perl is vulnerable to Algorithmic complexity on specially prepared input, leading to Denial of Service. Prepared special input that caused this problem contained 30 form-field characters ("\f"). | |||||
CVE-2014-0477 | 2 Email\, Fedoraproject | 2 \, Fedora | 2024-02-04 | 5.0 MEDIUM | N/A |
The parse function in Email::Address module before 1.905 for Perl uses an inefficient regular expression, which allows remote attackers to cause a denial of service (CPU consumption) via an empty quoted string in an RFC 2822 address. | |||||
CVE-2014-4720 | 1 Email\ | 1 \ | 2024-02-04 | 5.0 MEDIUM | N/A |
Email::Address module before 1.904 for Perl uses an inefficient regular expression, which allows remote attackers to cause a denial of service (CPU consumption) via vectors related to "backtracking into the phrase," a different vulnerability than CVE-2014-0477. | |||||
CVE-2014-1474 | 2 Bestpractical, Email\ | 2 Rt, \ | 2024-02-04 | 5.0 MEDIUM | N/A |
Algorithmic complexity vulnerability in Email::Address::List before 0.02, as used in RT 4.2.0 through 4.2.2, allows remote attackers to cause a denial of service (CPU consumption) via a string without an address. |