Show filters
5 Total Results
Displaying 1-5 of 5
Sort by:
Attacker Value
Unknown

CVE-2018-12558

Disclosure Date: June 20, 2018 (last updated November 26, 2024)
The parse() method in the Email::Address module through 1.909 for Perl is vulnerable to Algorithmic complexity on specially prepared input, leading to Denial of Service. Prepared special input that caused this problem contained 30 form-field characters ("\f").
0
Attacker Value
Unknown

CVE-2015-7686

Disclosure Date: October 06, 2015 (last updated October 05, 2023)
Algorithmic complexity vulnerability in Address.pm in the Email-Address module 1.908 and earlier for Perl allows remote attackers to cause a denial of service (CPU consumption) via a crafted string containing a list of e-mail addresses in conjunction with parenthesis characters that can be associated with nested comments. NOTE: the default configuration in 1.908 mitigates this vulnerability but misparses certain realistic comments.
0
Attacker Value
Unknown

CVE-2014-1474

Disclosure Date: July 15, 2014 (last updated October 05, 2023)
Algorithmic complexity vulnerability in Email::Address::List before 0.02, as used in RT 4.2.0 through 4.2.2, allows remote attackers to cause a denial of service (CPU consumption) via a string without an address.
0
Attacker Value
Unknown

CVE-2014-4720

Disclosure Date: July 06, 2014 (last updated October 05, 2023)
Email::Address module before 1.904 for Perl uses an inefficient regular expression, which allows remote attackers to cause a denial of service (CPU consumption) via vectors related to "backtracking into the phrase," a different vulnerability than CVE-2014-0477.
0
Attacker Value
Unknown

CVE-2014-0477

Disclosure Date: July 03, 2014 (last updated October 05, 2023)
The parse function in Email::Address module before 1.905 for Perl uses an inefficient regular expression, which allows remote attackers to cause a denial of service (CPU consumption) via an empty quoted string in an RFC 2822 address.
0