Количество 9
Количество 9

BDU:2024-04194
Уязвимость HTTP-клиента aiohttp, связанная с выполнением цикла с недоступным условием выхода, позволяющая нарушителю вызвать отказ в обслуживании

ROS-20250114-01
Множественные уязвимости python3-aiohttp

CVE-2024-30251
aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. In affected versions an attacker can send a specially crafted POST (multipart/form-data) request. When the aiohttp server processes it, the server will enter an infinite loop and be unable to process any further requests. An attacker can stop the application from serving requests after sending a single request. This issue has been addressed in version 3.9.4. Users are advised to upgrade. Users unable to upgrade may manually apply a patch to their systems. Please see the linked GHSA for instructions.

CVE-2024-30251
aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. In affected versions an attacker can send a specially crafted POST (multipart/form-data) request. When the aiohttp server processes it, the server will enter an infinite loop and be unable to process any further requests. An attacker can stop the application from serving requests after sending a single request. This issue has been addressed in version 3.9.4. Users are advised to upgrade. Users unable to upgrade may manually apply a patch to their systems. Please see the linked GHSA for instructions.

CVE-2024-30251
aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. In affected versions an attacker can send a specially crafted POST (multipart/form-data) request. When the aiohttp server processes it, the server will enter an infinite loop and be unable to process any further requests. An attacker can stop the application from serving requests after sending a single request. This issue has been addressed in version 3.9.4. Users are advised to upgrade. Users unable to upgrade may manually apply a patch to their systems. Please see the linked GHSA for instructions.
CVE-2024-30251
aiohttp is an asynchronous HTTP client/server framework for asyncio an ...

SUSE-SU-2024:4328-1
Security update for python-aiohttp

SUSE-SU-2024:4327-1
Security update for python-aiohttp
GHSA-5m98-qgg9-wh84
aiohttp vulnerable to Denial of Service when trying to parse malformed POST requests
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | BDU:2024-04194 Уязвимость HTTP-клиента aiohttp, связанная с выполнением цикла с недоступным условием выхода, позволяющая нарушителю вызвать отказ в обслуживании | CVSS3: 7.5 | 0% Низкий | около 1 года назад |
![]() | ROS-20250114-01 Множественные уязвимости python3-aiohttp | CVSS3: 7.5 | 5 месяцев назад | |
![]() | CVE-2024-30251 aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. In affected versions an attacker can send a specially crafted POST (multipart/form-data) request. When the aiohttp server processes it, the server will enter an infinite loop and be unable to process any further requests. An attacker can stop the application from serving requests after sending a single request. This issue has been addressed in version 3.9.4. Users are advised to upgrade. Users unable to upgrade may manually apply a patch to their systems. Please see the linked GHSA for instructions. | CVSS3: 7.5 | 0% Низкий | около 1 года назад |
![]() | CVE-2024-30251 aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. In affected versions an attacker can send a specially crafted POST (multipart/form-data) request. When the aiohttp server processes it, the server will enter an infinite loop and be unable to process any further requests. An attacker can stop the application from serving requests after sending a single request. This issue has been addressed in version 3.9.4. Users are advised to upgrade. Users unable to upgrade may manually apply a patch to their systems. Please see the linked GHSA for instructions. | CVSS3: 7.5 | 0% Низкий | около 1 года назад |
![]() | CVE-2024-30251 aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. In affected versions an attacker can send a specially crafted POST (multipart/form-data) request. When the aiohttp server processes it, the server will enter an infinite loop and be unable to process any further requests. An attacker can stop the application from serving requests after sending a single request. This issue has been addressed in version 3.9.4. Users are advised to upgrade. Users unable to upgrade may manually apply a patch to their systems. Please see the linked GHSA for instructions. | CVSS3: 7.5 | 0% Низкий | около 1 года назад |
CVE-2024-30251 aiohttp is an asynchronous HTTP client/server framework for asyncio an ... | CVSS3: 7.5 | 0% Низкий | около 1 года назад | |
![]() | SUSE-SU-2024:4328-1 Security update for python-aiohttp | 0% Низкий | 6 месяцев назад | |
![]() | SUSE-SU-2024:4327-1 Security update for python-aiohttp | 0% Низкий | 6 месяцев назад | |
GHSA-5m98-qgg9-wh84 aiohttp vulnerable to Denial of Service when trying to parse malformed POST requests | CVSS3: 7.5 | 0% Низкий | около 1 года назад |
Уязвимостей на страницу