Логотип exploitDog
bind:"CVE-2025-66418" OR bind:"CVE-2025-66471" OR bind:"CVE-2026-21441"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2025-66418" OR bind:"CVE-2025-66471" OR bind:"CVE-2026-21441"

Количество 28

Количество 28

oracle-oval логотип

ELSA-2026-1254

11 дней назад

ELSA-2026-1254: python-urllib3 security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2026-1241

11 дней назад

ELSA-2026-1241: resource-agents security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2026-1240

10 дней назад

ELSA-2026-1240: fence-agents security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2026-1239

10 дней назад

ELSA-2026-1239: fence-agents security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2026-1226

11 дней назад

ELSA-2026-1226: python3.12-urllib3 security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2026-1224

11 дней назад

ELSA-2026-1224: python3.11-urllib3 security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2026-1089

11 дней назад

ELSA-2026-1089: python3.11-urllib3 security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2026-1088

11 дней назад

ELSA-2026-1088: python3.12-urllib3 security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2026-1087

11 дней назад

ELSA-2026-1087: python-urllib3 security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2026-1086

11 дней назад

ELSA-2026-1086: python-urllib3 security update (IMPORTANT)

EPSS: Низкий
ubuntu логотип

CVE-2025-66418

2 месяца назад

urllib3 is a user-friendly HTTP client library for Python. Starting in version 1.24 and prior to 2.6.0, the number of links in the decompression chain was unbounded allowing a malicious server to insert a virtually unlimited number of compression steps leading to high CPU usage and massive memory allocation for the decompressed data. This vulnerability is fixed in 2.6.0.

CVSS3: 7.5
EPSS: Низкий
nvd логотип

CVE-2025-66418

2 месяца назад

urllib3 is a user-friendly HTTP client library for Python. Starting in version 1.24 and prior to 2.6.0, the number of links in the decompression chain was unbounded allowing a malicious server to insert a virtually unlimited number of compression steps leading to high CPU usage and massive memory allocation for the decompressed data. This vulnerability is fixed in 2.6.0.

CVSS3: 7.5
EPSS: Низкий
msrc логотип

CVE-2025-66418

около 2 месяцев назад

urllib3 allows an unbounded number of links in the decompression chain

EPSS: Низкий
debian логотип

CVE-2025-66418

2 месяца назад

urllib3 is a user-friendly HTTP client library for Python. Starting in ...

CVSS3: 7.5
EPSS: Низкий
redos логотип

ROS-20260122-73-0029

15 дней назад

Уязвимость brotli

CVSS3: 8.6
EPSS: Низкий
github логотип

GHSA-gm62-xv2j-4w53

2 месяца назад

urllib3 allows an unbounded number of links in the decompression chain

EPSS: Низкий
ubuntu логотип

CVE-2026-21441

29 дней назад

urllib3 is an HTTP client library for Python. urllib3's streaming API is designed for the efficient handling of large HTTP responses by reading the content in chunks, rather than loading the entire response body into memory at once. urllib3 can perform decoding or decompression based on the HTTP `Content-Encoding` header (e.g., `gzip`, `deflate`, `br`, or `zstd`). When using the streaming API, the library decompresses only the necessary bytes, enabling partial content consumption. Starting in version 1.22 and prior to version 2.6.3, for HTTP redirect responses, the library would read the entire response body to drain the connection and decompress the content unnecessarily. This decompression occurred even before any read methods were called, and configured read limits did not restrict the amount of decompressed data. As a result, there was no safeguard against decompression bombs. A malicious server could exploit this to trigger excessive resource consumption on the client. Applicat...

CVSS3: 7.5
EPSS: Низкий
nvd логотип

CVE-2026-21441

29 дней назад

urllib3 is an HTTP client library for Python. urllib3's streaming API is designed for the efficient handling of large HTTP responses by reading the content in chunks, rather than loading the entire response body into memory at once. urllib3 can perform decoding or decompression based on the HTTP `Content-Encoding` header (e.g., `gzip`, `deflate`, `br`, or `zstd`). When using the streaming API, the library decompresses only the necessary bytes, enabling partial content consumption. Starting in version 1.22 and prior to version 2.6.3, for HTTP redirect responses, the library would read the entire response body to drain the connection and decompress the content unnecessarily. This decompression occurred even before any read methods were called, and configured read limits did not restrict the amount of decompressed data. As a result, there was no safeguard against decompression bombs. A malicious server could exploit this to trigger excessive resource consumption on the client. Application

CVSS3: 7.5
EPSS: Низкий
debian логотип

CVE-2026-21441

29 дней назад

urllib3 is an HTTP client library for Python. urllib3's streaming API ...

CVSS3: 7.5
EPSS: Низкий
ubuntu логотип

CVE-2025-66471

2 месяца назад

urllib3 is a user-friendly HTTP client library for Python. Starting in version 1.0 and prior to 2.6.0, the Streaming API improperly handles highly compressed data. urllib3's streaming API is designed for the efficient handling of large HTTP responses by reading the content in chunks, rather than loading the entire response body into memory at once. When streaming a compressed response, urllib3 can perform decoding or decompression based on the HTTP Content-Encoding header (e.g., gzip, deflate, br, or zstd). The library must read compressed data from the network and decompress it until the requested chunk size is met. Any resulting decompressed data that exceeds the requested amount is held in an internal buffer for the next read operation. The decompression logic could cause urllib3 to fully decode a small amount of highly compressed data in a single operation. This can result in excessive resource consumption (high CPU usage and massive memory allocation for the decompressed data.

CVSS3: 7.5
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
oracle-oval логотип
ELSA-2026-1254

ELSA-2026-1254: python-urllib3 security update (IMPORTANT)

11 дней назад
oracle-oval логотип
ELSA-2026-1241

ELSA-2026-1241: resource-agents security update (IMPORTANT)

11 дней назад
oracle-oval логотип
ELSA-2026-1240

ELSA-2026-1240: fence-agents security update (IMPORTANT)

10 дней назад
oracle-oval логотип
ELSA-2026-1239

ELSA-2026-1239: fence-agents security update (IMPORTANT)

10 дней назад
oracle-oval логотип
ELSA-2026-1226

ELSA-2026-1226: python3.12-urllib3 security update (IMPORTANT)

11 дней назад
oracle-oval логотип
ELSA-2026-1224

ELSA-2026-1224: python3.11-urllib3 security update (IMPORTANT)

11 дней назад
oracle-oval логотип
ELSA-2026-1089

ELSA-2026-1089: python3.11-urllib3 security update (IMPORTANT)

11 дней назад
oracle-oval логотип
ELSA-2026-1088

ELSA-2026-1088: python3.12-urllib3 security update (IMPORTANT)

11 дней назад
oracle-oval логотип
ELSA-2026-1087

ELSA-2026-1087: python-urllib3 security update (IMPORTANT)

11 дней назад
oracle-oval логотип
ELSA-2026-1086

ELSA-2026-1086: python-urllib3 security update (IMPORTANT)

11 дней назад
ubuntu логотип
CVE-2025-66418

urllib3 is a user-friendly HTTP client library for Python. Starting in version 1.24 and prior to 2.6.0, the number of links in the decompression chain was unbounded allowing a malicious server to insert a virtually unlimited number of compression steps leading to high CPU usage and massive memory allocation for the decompressed data. This vulnerability is fixed in 2.6.0.

CVSS3: 7.5
0%
Низкий
2 месяца назад
nvd логотип
CVE-2025-66418

urllib3 is a user-friendly HTTP client library for Python. Starting in version 1.24 and prior to 2.6.0, the number of links in the decompression chain was unbounded allowing a malicious server to insert a virtually unlimited number of compression steps leading to high CPU usage and massive memory allocation for the decompressed data. This vulnerability is fixed in 2.6.0.

CVSS3: 7.5
0%
Низкий
2 месяца назад
msrc логотип
CVE-2025-66418

urllib3 allows an unbounded number of links in the decompression chain

0%
Низкий
около 2 месяцев назад
debian логотип
CVE-2025-66418

urllib3 is a user-friendly HTTP client library for Python. Starting in ...

CVSS3: 7.5
0%
Низкий
2 месяца назад
redos логотип
ROS-20260122-73-0029

Уязвимость brotli

CVSS3: 8.6
0%
Низкий
15 дней назад
github логотип
GHSA-gm62-xv2j-4w53

urllib3 allows an unbounded number of links in the decompression chain

0%
Низкий
2 месяца назад
ubuntu логотип
CVE-2026-21441

urllib3 is an HTTP client library for Python. urllib3's streaming API is designed for the efficient handling of large HTTP responses by reading the content in chunks, rather than loading the entire response body into memory at once. urllib3 can perform decoding or decompression based on the HTTP `Content-Encoding` header (e.g., `gzip`, `deflate`, `br`, or `zstd`). When using the streaming API, the library decompresses only the necessary bytes, enabling partial content consumption. Starting in version 1.22 and prior to version 2.6.3, for HTTP redirect responses, the library would read the entire response body to drain the connection and decompress the content unnecessarily. This decompression occurred even before any read methods were called, and configured read limits did not restrict the amount of decompressed data. As a result, there was no safeguard against decompression bombs. A malicious server could exploit this to trigger excessive resource consumption on the client. Applicat...

CVSS3: 7.5
0%
Низкий
29 дней назад
nvd логотип
CVE-2026-21441

urllib3 is an HTTP client library for Python. urllib3's streaming API is designed for the efficient handling of large HTTP responses by reading the content in chunks, rather than loading the entire response body into memory at once. urllib3 can perform decoding or decompression based on the HTTP `Content-Encoding` header (e.g., `gzip`, `deflate`, `br`, or `zstd`). When using the streaming API, the library decompresses only the necessary bytes, enabling partial content consumption. Starting in version 1.22 and prior to version 2.6.3, for HTTP redirect responses, the library would read the entire response body to drain the connection and decompress the content unnecessarily. This decompression occurred even before any read methods were called, and configured read limits did not restrict the amount of decompressed data. As a result, there was no safeguard against decompression bombs. A malicious server could exploit this to trigger excessive resource consumption on the client. Application

CVSS3: 7.5
0%
Низкий
29 дней назад
debian логотип
CVE-2026-21441

urllib3 is an HTTP client library for Python. urllib3's streaming API ...

CVSS3: 7.5
0%
Низкий
29 дней назад
ubuntu логотип
CVE-2025-66471

urllib3 is a user-friendly HTTP client library for Python. Starting in version 1.0 and prior to 2.6.0, the Streaming API improperly handles highly compressed data. urllib3's streaming API is designed for the efficient handling of large HTTP responses by reading the content in chunks, rather than loading the entire response body into memory at once. When streaming a compressed response, urllib3 can perform decoding or decompression based on the HTTP Content-Encoding header (e.g., gzip, deflate, br, or zstd). The library must read compressed data from the network and decompress it until the requested chunk size is met. Any resulting decompressed data that exceeds the requested amount is held in an internal buffer for the next read operation. The decompression logic could cause urllib3 to fully decode a small amount of highly compressed data in a single operation. This can result in excessive resource consumption (high CPU usage and massive memory allocation for the decompressed data.

CVSS3: 7.5
0%
Низкий
2 месяца назад

Уязвимостей на страницу