Логотип exploitDog
bind:CVE-2025-69229
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2025-69229

Количество 4

Количество 4

ubuntu логотип

CVE-2025-69229

10 дней назад

AIOHTTP is an asynchronous HTTP client/server framework for asyncio and Python. In versions 3.13.2 and below, handling of chunked messages can result in excessive blocking CPU usage when receiving a large number of chunks. If an application makes use of the request.read() method in an endpoint, it may be possible for an attacker to cause the server to spend a moderate amount of blocking CPU time (e.g. 1 second) while processing the request. This could potentially lead to DoS as the server would be unable to handle other requests during that time. This issue is fixed in version 3.13.3.

EPSS: Низкий
nvd логотип

CVE-2025-69229

10 дней назад

AIOHTTP is an asynchronous HTTP client/server framework for asyncio and Python. In versions 3.13.2 and below, handling of chunked messages can result in excessive blocking CPU usage when receiving a large number of chunks. If an application makes use of the request.read() method in an endpoint, it may be possible for an attacker to cause the server to spend a moderate amount of blocking CPU time (e.g. 1 second) while processing the request. This could potentially lead to DoS as the server would be unable to handle other requests during that time. This issue is fixed in version 3.13.3.

EPSS: Низкий
debian логотип

CVE-2025-69229

10 дней назад

AIOHTTP is an asynchronous HTTP client/server framework for asyncio an ...

EPSS: Низкий
github логотип

GHSA-g84x-mcqj-x9qq

10 дней назад

AIOHTTP vulnerable to DoS through chunked messages

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2025-69229

AIOHTTP is an asynchronous HTTP client/server framework for asyncio and Python. In versions 3.13.2 and below, handling of chunked messages can result in excessive blocking CPU usage when receiving a large number of chunks. If an application makes use of the request.read() method in an endpoint, it may be possible for an attacker to cause the server to spend a moderate amount of blocking CPU time (e.g. 1 second) while processing the request. This could potentially lead to DoS as the server would be unable to handle other requests during that time. This issue is fixed in version 3.13.3.

0%
Низкий
10 дней назад
nvd логотип
CVE-2025-69229

AIOHTTP is an asynchronous HTTP client/server framework for asyncio and Python. In versions 3.13.2 and below, handling of chunked messages can result in excessive blocking CPU usage when receiving a large number of chunks. If an application makes use of the request.read() method in an endpoint, it may be possible for an attacker to cause the server to spend a moderate amount of blocking CPU time (e.g. 1 second) while processing the request. This could potentially lead to DoS as the server would be unable to handle other requests during that time. This issue is fixed in version 3.13.3.

0%
Низкий
10 дней назад
debian логотип
CVE-2025-69229

AIOHTTP is an asynchronous HTTP client/server framework for asyncio an ...

0%
Низкий
10 дней назад
github логотип
GHSA-g84x-mcqj-x9qq

AIOHTTP vulnerable to DoS through chunked messages

0%
Низкий
10 дней назад

Уязвимостей на страницу