Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-c2fh-m553-m5hp

Опубликовано: 14 мая 2022
Источник: github
Github: Не прошло ревью
CVSS3: 7.5

Описание

The parse() method in the Email::Address module through 1.909 for Perl is vulnerable to Algorithmic complexity on specially prepared input, leading to Denial of Service. Prepared special input that caused this problem contained 30 form-field characters ("\f").

The parse() method in the Email::Address module through 1.909 for Perl is vulnerable to Algorithmic complexity on specially prepared input, leading to Denial of Service. Prepared special input that caused this problem contained 30 form-field characters ("\f").

EPSS

Процентиль: 66%
0.00525
Низкий

7.5 High

CVSS3

Дефекты

CWE-407

Связанные уязвимости

CVSS3: 7.5
ubuntu
больше 7 лет назад

The parse() method in the Email::Address module through 1.909 for Perl is vulnerable to Algorithmic complexity on specially prepared input, leading to Denial of Service. Prepared special input that caused this problem contained 30 form-field characters ("\f").

CVSS3: 7.5
redhat
больше 7 лет назад

The parse() method in the Email::Address module through 1.909 for Perl is vulnerable to Algorithmic complexity on specially prepared input, leading to Denial of Service. Prepared special input that caused this problem contained 30 form-field characters ("\f").

CVSS3: 7.5
nvd
больше 7 лет назад

The parse() method in the Email::Address module through 1.909 for Perl is vulnerable to Algorithmic complexity on specially prepared input, leading to Denial of Service. Prepared special input that caused this problem contained 30 form-field characters ("\f").

CVSS3: 7.5
debian
больше 7 лет назад

The parse() method in the Email::Address module through 1.909 for Perl ...

suse-cvrf
почти 7 лет назад

Security update for perl-Email-Address

EPSS

Процентиль: 66%
0.00525
Низкий

7.5 High

CVSS3

Дефекты

CWE-407