Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

msrc логотип

CVE-2025-13836

Опубликовано: 05 дек. 2025
Источник: msrc
EPSS Низкий

Описание

Excessive read buffering DoS in http.client

EPSS

Процентиль: 29%
0.00103
Низкий

Связанные уязвимости

CVSS3: 9.1
ubuntu
2 месяца назад

When reading an HTTP response from a server, if no read amount is specified, the default behavior will be to use Content-Length. This allows a malicious server to cause the client to read large amounts of data into memory, potentially causing OOM or other DoS.

CVSS3: 9.1
nvd
2 месяца назад

When reading an HTTP response from a server, if no read amount is specified, the default behavior will be to use Content-Length. This allows a malicious server to cause the client to read large amounts of data into memory, potentially causing OOM or other DoS.

CVSS3: 9.1
debian
2 месяца назад

When reading an HTTP response from a server, if no read amount is spec ...

CVSS3: 9.1
github
2 месяца назад

When reading an HTTP response from a server, if no read amount is specified, the default behavior will be to use Content-Length. This allows a malicious server to cause the client to read large amounts of data into memory, potentially causing OOM or other DoS.

rocky
7 дней назад

Moderate: python3.11 security update

EPSS

Процентиль: 29%
0.00103
Низкий