Количество 13
Количество 13
CVE-2025-13836
When reading an HTTP response from a server, if no read amount is specified, the default behavior will be to use Content-Length. This allows a malicious server to cause the client to read large amounts of data into memory, potentially causing OOM or other DoS.
CVE-2025-13836
When reading an HTTP response from a server, if no read amount is specified, the default behavior will be to use Content-Length. This allows a malicious server to cause the client to read large amounts of data into memory, potentially causing OOM or other DoS.
CVE-2025-13836
Excessive read buffering DoS in http.client
CVE-2025-13836
When reading an HTTP response from a server, if no read amount is spec ...
GHSA-399h-rrqc-rpgv
When reading an HTTP response from a server, if no read amount is specified, the default behavior will be to use Content-Length. This allows a malicious server to cause the client to read large amounts of data into memory, potentially causing OOM or other DoS.
SUSE-SU-2026:0268-1
Security update for python
SUSE-SU-2026:0133-1
Security update for python
SUSE-SU-2026:0130-1
Security update for python310
SUSE-SU-2026:0027-1
Security update for python3
SUSE-SU-2026:0025-1
Security update for python312
SUSE-SU-2026:0024-1
Security update for python313
SUSE-SU-2025:4522-1
Security update for python39
openSUSE-SU-2026:20081-1
Security update for python313
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2025-13836 When reading an HTTP response from a server, if no read amount is specified, the default behavior will be to use Content-Length. This allows a malicious server to cause the client to read large amounts of data into memory, potentially causing OOM or other DoS. | CVSS3: 9.1 | 0% Низкий | 2 месяца назад | |
CVE-2025-13836 When reading an HTTP response from a server, if no read amount is specified, the default behavior will be to use Content-Length. This allows a malicious server to cause the client to read large amounts of data into memory, potentially causing OOM or other DoS. | CVSS3: 9.1 | 0% Низкий | 2 месяца назад | |
CVE-2025-13836 Excessive read buffering DoS in http.client | 0% Низкий | 2 месяца назад | ||
CVE-2025-13836 When reading an HTTP response from a server, if no read amount is spec ... | CVSS3: 9.1 | 0% Низкий | 2 месяца назад | |
GHSA-399h-rrqc-rpgv When reading an HTTP response from a server, if no read amount is specified, the default behavior will be to use Content-Length. This allows a malicious server to cause the client to read large amounts of data into memory, potentially causing OOM or other DoS. | CVSS3: 9.1 | 0% Низкий | 2 месяца назад | |
SUSE-SU-2026:0268-1 Security update for python | 12 дней назад | |||
SUSE-SU-2026:0133-1 Security update for python | 19 дней назад | |||
SUSE-SU-2026:0130-1 Security update for python310 | 20 дней назад | |||
SUSE-SU-2026:0027-1 Security update for python3 | 30 дней назад | |||
SUSE-SU-2026:0025-1 Security update for python312 | 30 дней назад | |||
SUSE-SU-2026:0024-1 Security update for python313 | 30 дней назад | |||
SUSE-SU-2025:4522-1 Security update for python39 | около 1 месяца назад | |||
openSUSE-SU-2026:20081-1 Security update for python313 | 13 дней назад |
Уязвимостей на страницу