Email::Address module project Email::Address module for Perl 1.898

CPE Details

Email::Address module project Email::Address module for Perl 1.898
1.898
2014-07-07
12h33 +00:00
2014-07-10
11h53 +00:00
Alerte pour un CPE
Restez informé de toutes modifications pour un CPE spécifique.
Gestion des notifications

CPE Name: cpe:2.3:a:email\:\:address_module_project:email\:\:address:1.898:*:*:*:*:perl:*:*

Informations

Vendor

email::address_module_project

Product

email::address

Version

1.898

Target Software

perl

Related CVE

Open and find in CVE List

CVE ID Publié Description Score Gravité
CVE-2018-12558 2018-06-20 12h00 +00:00 The parse() method in the Email::Address module through 1.909 for Perl is vulnerable to Algorithmic complexity on specially prepared input, leading to Denial of Service. Prepared special input that caused this problem contained 30 form-field characters ("\f").
7.5
Haute
CVE-2014-4720 2014-07-06 23h00 +00:00 Email::Address module before 1.904 for Perl uses an inefficient regular expression, which allows remote attackers to cause a denial of service (CPU consumption) via vectors related to "backtracking into the phrase," a different vulnerability than CVE-2014-0477.
5
CVE-2014-0477 2014-07-03 15h00 +00:00 The parse function in Email::Address module before 1.905 for Perl uses an inefficient regular expression, which allows remote attackers to cause a denial of service (CPU consumption) via an empty quoted string in an RFC 2822 address.
5