Логотип exploitDog
bind: "CVE-2023-46136"
Консоль
Логотип exploitDog

exploitDog

bind: "CVE-2023-46136"

Количество 9

Количество 9

ubuntu логотип

CVE-2023-46136

больше 1 года назад

Werkzeug is a comprehensive WSGI web application library. If an upload of a file that starts with CR or LF and then is followed by megabytes of data without these characters: all of these bytes are appended chunk by chunk into internal bytearray and lookup for boundary is performed on growing buffer. This allows an attacker to cause a denial of service by sending crafted multipart data to an endpoint that will parse it. The amount of CPU time required can block worker processes from handling legitimate requests. This vulnerability has been patched in version 3.0.1.

CVSS3: 8
EPSS: Низкий
redhat логотип

CVE-2023-46136

больше 1 года назад

Werkzeug is a comprehensive WSGI web application library. If an upload of a file that starts with CR or LF and then is followed by megabytes of data without these characters: all of these bytes are appended chunk by chunk into internal bytearray and lookup for boundary is performed on growing buffer. This allows an attacker to cause a denial of service by sending crafted multipart data to an endpoint that will parse it. The amount of CPU time required can block worker processes from handling legitimate requests. This vulnerability has been patched in version 3.0.1.

CVSS3: 7.5
EPSS: Низкий
nvd логотип

CVE-2023-46136

больше 1 года назад

Werkzeug is a comprehensive WSGI web application library. If an upload of a file that starts with CR or LF and then is followed by megabytes of data without these characters: all of these bytes are appended chunk by chunk into internal bytearray and lookup for boundary is performed on growing buffer. This allows an attacker to cause a denial of service by sending crafted multipart data to an endpoint that will parse it. The amount of CPU time required can block worker processes from handling legitimate requests. This vulnerability has been patched in version 3.0.1.

CVSS3: 8
EPSS: Низкий
msrc логотип

CVE-2023-46136

больше 1 года назад

CVSS3: 7.5
EPSS: Низкий
debian логотип

CVE-2023-46136

больше 1 года назад

Werkzeug is a comprehensive WSGI web application library. If an upload ...

CVSS3: 8
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:4288-1

больше 1 года назад

Security update for python-Werkzeug

EPSS: Низкий
github логотип

GHSA-hrfv-mqp8-q5rw

больше 1 года назад

Werkzeug DoS: High resource usage when parsing multipart/form-data containing a large part with CR/LF character at the beginning

CVSS3: 5.7
EPSS: Низкий
fstec логотип

BDU:2025-03945

больше 1 года назад

Уязвимость библиотеки для разработки веб-приложений Werkzeug, связанная с записью за границами буфера, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 7.5
EPSS: Низкий
redos логотип

ROS-20240703-09

12 месяцев назад

Множественные уязвимости python-werkzeug

CVSS3: 7.5
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2023-46136

Werkzeug is a comprehensive WSGI web application library. If an upload of a file that starts with CR or LF and then is followed by megabytes of data without these characters: all of these bytes are appended chunk by chunk into internal bytearray and lookup for boundary is performed on growing buffer. This allows an attacker to cause a denial of service by sending crafted multipart data to an endpoint that will parse it. The amount of CPU time required can block worker processes from handling legitimate requests. This vulnerability has been patched in version 3.0.1.

CVSS3: 8
0%
Низкий
больше 1 года назад
redhat логотип
CVE-2023-46136

Werkzeug is a comprehensive WSGI web application library. If an upload of a file that starts with CR or LF and then is followed by megabytes of data without these characters: all of these bytes are appended chunk by chunk into internal bytearray and lookup for boundary is performed on growing buffer. This allows an attacker to cause a denial of service by sending crafted multipart data to an endpoint that will parse it. The amount of CPU time required can block worker processes from handling legitimate requests. This vulnerability has been patched in version 3.0.1.

CVSS3: 7.5
0%
Низкий
больше 1 года назад
nvd логотип
CVE-2023-46136

Werkzeug is a comprehensive WSGI web application library. If an upload of a file that starts with CR or LF and then is followed by megabytes of data without these characters: all of these bytes are appended chunk by chunk into internal bytearray and lookup for boundary is performed on growing buffer. This allows an attacker to cause a denial of service by sending crafted multipart data to an endpoint that will parse it. The amount of CPU time required can block worker processes from handling legitimate requests. This vulnerability has been patched in version 3.0.1.

CVSS3: 8
0%
Низкий
больше 1 года назад
msrc логотип
CVSS3: 7.5
0%
Низкий
больше 1 года назад
debian логотип
CVE-2023-46136

Werkzeug is a comprehensive WSGI web application library. If an upload ...

CVSS3: 8
0%
Низкий
больше 1 года назад
suse-cvrf логотип
SUSE-SU-2023:4288-1

Security update for python-Werkzeug

0%
Низкий
больше 1 года назад
github логотип
GHSA-hrfv-mqp8-q5rw

Werkzeug DoS: High resource usage when parsing multipart/form-data containing a large part with CR/LF character at the beginning

CVSS3: 5.7
0%
Низкий
больше 1 года назад
fstec логотип
BDU:2025-03945

Уязвимость библиотеки для разработки веб-приложений Werkzeug, связанная с записью за границами буфера, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 7.5
0%
Низкий
больше 1 года назад
redos логотип
ROS-20240703-09

Множественные уязвимости python-werkzeug

CVSS3: 7.5
12 месяцев назад

Уязвимостей на страницу