Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-399h-rrqc-rpgv

Опубликовано: 01 дек. 2025
Источник: github
Github: Не прошло ревью
CVSS4: 6.3
CVSS3: 9.1

Описание

When reading an HTTP response from a server, if no read amount is specified, the default behavior will be to use Content-Length. This allows a malicious server to cause the client to read large amounts of data into memory, potentially causing OOM or other DoS.

When reading an HTTP response from a server, if no read amount is specified, the default behavior will be to use Content-Length. This allows a malicious server to cause the client to read large amounts of data into memory, potentially causing OOM or other DoS.

EPSS

Процентиль: 36%
0.00152
Низкий

6.3 Medium

CVSS4

9.1 Critical

CVSS3

Дефекты

CWE-125
CWE-400

Связанные уязвимости

CVSS3: 7.5
ubuntu
4 месяца назад

When reading an HTTP response from a server, if no read amount is specified, the default behavior will be to use Content-Length. This allows a malicious server to cause the client to read large amounts of data into memory, potentially causing OOM or other DoS.

CVSS3: 6.8
redhat
4 месяца назад

When reading an HTTP response from a server, if no read amount is specified, the default behavior will be to use Content-Length. This allows a malicious server to cause the client to read large amounts of data into memory, potentially causing OOM or other DoS.

CVSS3: 7.5
nvd
4 месяца назад

When reading an HTTP response from a server, if no read amount is specified, the default behavior will be to use Content-Length. This allows a malicious server to cause the client to read large amounts of data into memory, potentially causing OOM or other DoS.

msrc
4 месяца назад

Excessive read buffering DoS in http.client

CVSS3: 7.5
debian
4 месяца назад

When reading an HTTP response from a server, if no read amount is spec ...

EPSS

Процентиль: 36%
0.00152
Низкий

6.3 Medium

CVSS4

9.1 Critical

CVSS3

Дефекты

CWE-125
CWE-400