Vulnerabilities (CVE)

Filtered by vendor Email\ Subscribe
Filtered by product \
Total 4 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2018-12558 1 Email\ 1 \ 2023-12-10 5.0 MEDIUM 7.5 HIGH
The parse() method in the Email::Address module through 1.909 for Perl is vulnerable to Algorithmic complexity on specially prepared input, leading to Denial of Service. Prepared special input that caused this problem contained 30 form-field characters ("\f").
CVE-2014-1474 2 Bestpractical, Email\ 2 Rt, \ 2023-12-10 5.0 MEDIUM N/A
Algorithmic complexity vulnerability in Email::Address::List before 0.02, as used in RT 4.2.0 through 4.2.2, allows remote attackers to cause a denial of service (CPU consumption) via a string without an address.
CVE-2014-4720 1 Email\ 1 \ 2023-12-10 5.0 MEDIUM N/A
Email::Address module before 1.904 for Perl uses an inefficient regular expression, which allows remote attackers to cause a denial of service (CPU consumption) via vectors related to "backtracking into the phrase," a different vulnerability than CVE-2014-0477.
CVE-2014-0477 2 Email\, Fedoraproject 2 \, Fedora 2023-12-10 5.0 MEDIUM N/A
The parse function in Email::Address module before 1.905 for Perl uses an inefficient regular expression, which allows remote attackers to cause a denial of service (CPU consumption) via an empty quoted string in an RFC 2822 address.