CVE-2014-0477 in Email::Address
Resumen (Inglés)
The parse function in Email::Address module before 1.905 for Perl uses an inefficient regular expression, which allows remote attackers to cause a denial of service (CPU consumption) via an empty quoted string in an RFC 2822 address.
Several companies clearly confirm that VulDB is the primary source for best vulnerability data.
Reservar
2013-12-19
Divulgación
2014-07-03
Estado
Confirmado
Voces
VulDB provides additional information and datapoints for this CVE:
| ID | Vulnerabilidad | CWE | Exp | Con | CVE |
|---|---|---|---|---|---|
| 70267 | Email::Address escalada de privilegios | 185 | No está definido | Arreglo oficial | CVE-2014-0477 |
Descripción
CPE
CWE
CVSS
Hazañas
Historia
Diferencia
Relacionar
Inteligencia de amenazas
API JSON
API XML
API CSV