Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-399h-rrqc-rpgv

Опубликовано: 01 дек. 2025
Источник: github
Github: Не прошло ревью
CVSS4: 6.3
CVSS3: 9.1

Описание

When reading an HTTP response from a server, if no read amount is specified, the default behavior will be to use Content-Length. This allows a malicious server to cause the client to read large amounts of data into memory, potentially causing OOM or other DoS.

When reading an HTTP response from a server, if no read amount is specified, the default behavior will be to use Content-Length. This allows a malicious server to cause the client to read large amounts of data into memory, potentially causing OOM or other DoS.

EPSS

Процентиль: 25%
0.00087
Низкий

6.3 Medium

CVSS4

9.1 Critical

CVSS3

Дефекты

CWE-125
CWE-400

Связанные уязвимости

CVSS3: 9.1
ubuntu
2 месяца назад

When reading an HTTP response from a server, if no read amount is specified, the default behavior will be to use Content-Length. This allows a malicious server to cause the client to read large amounts of data into memory, potentially causing OOM or other DoS.

CVSS3: 9.1
nvd
2 месяца назад

When reading an HTTP response from a server, if no read amount is specified, the default behavior will be to use Content-Length. This allows a malicious server to cause the client to read large amounts of data into memory, potentially causing OOM or other DoS.

msrc
2 месяца назад

Excessive read buffering DoS in http.client

CVSS3: 9.1
debian
2 месяца назад

When reading an HTTP response from a server, if no read amount is spec ...

suse-cvrf
19 дней назад

Security update for python

EPSS

Процентиль: 25%
0.00087
Низкий

6.3 Medium

CVSS4

9.1 Critical

CVSS3

Дефекты

CWE-125
CWE-400