Логотип exploitDog
bind:"CVE-2025-67726"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2025-67726"

Количество 13

Количество 13

ubuntu логотип

CVE-2025-67726

4 месяца назад

Tornado is a Python web framework and asynchronous networking library. Versions 6.5.2 and below use an inefficient algorithm when parsing parameters for HTTP header values, potentially causing a DoS. The _parseparam function in httputil.py is used to parse specific HTTP header values, such as those in multipart/form-data and repeatedly calls string.count() within a nested loop while processing quoted semicolons. If an attacker sends a request with a large number of maliciously crafted parameters in a Content-Disposition header, the server's CPU usage increases quadratically (O(n²)) during parsing. Due to Tornado's single event loop architecture, a single malicious request can cause the entire server to become unresponsive for an extended period. This issue is fixed in version 6.5.3.

CVSS3: 7.5
EPSS: Низкий
redhat логотип

CVE-2025-67726

4 месяца назад

Tornado is a Python web framework and asynchronous networking library. Versions 6.5.2 and below use an inefficient algorithm when parsing parameters for HTTP header values, potentially causing a DoS. The _parseparam function in httputil.py is used to parse specific HTTP header values, such as those in multipart/form-data and repeatedly calls string.count() within a nested loop while processing quoted semicolons. If an attacker sends a request with a large number of maliciously crafted parameters in a Content-Disposition header, the server's CPU usage increases quadratically (O(n²)) during parsing. Due to Tornado's single event loop architecture, a single malicious request can cause the entire server to become unresponsive for an extended period. This issue is fixed in version 6.5.3.

CVSS3: 5.3
EPSS: Низкий
nvd логотип

CVE-2025-67726

4 месяца назад

Tornado is a Python web framework and asynchronous networking library. Versions 6.5.2 and below use an inefficient algorithm when parsing parameters for HTTP header values, potentially causing a DoS. The _parseparam function in httputil.py is used to parse specific HTTP header values, such as those in multipart/form-data and repeatedly calls string.count() within a nested loop while processing quoted semicolons. If an attacker sends a request with a large number of maliciously crafted parameters in a Content-Disposition header, the server's CPU usage increases quadratically (O(n²)) during parsing. Due to Tornado's single event loop architecture, a single malicious request can cause the entire server to become unresponsive for an extended period. This issue is fixed in version 6.5.3.

CVSS3: 7.5
EPSS: Низкий
debian логотип

CVE-2025-67726

4 месяца назад

Tornado is a Python web framework and asynchronous networking library. ...

CVSS3: 7.5
EPSS: Низкий
fstec логотип

BDU:2026-02928

4 месяца назад

Уязвимость функции _parseparam компонента httputil.py веб-фреймворка Python Tornado, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 7.5
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2026:0222-1

2 месяца назад

Security update for python-tornado

EPSS: Низкий
oracle-oval логотип

ELSA-2026-0930

3 месяца назад

ELSA-2026-0930: pcs security update (MODERATE)

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2026:20015-1

3 месяца назад

Security update for python-tornado6

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2026:0010-1

3 месяца назад

Security update for python-tornado6

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2026:20412-1

13 дней назад

Security update for salt

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2026:1030-1

12 дней назад

Security update for salt

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2026:1029-1

12 дней назад

Security update for salt

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2026:1028-1

12 дней назад

Security update for salt

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2025-67726

Tornado is a Python web framework and asynchronous networking library. Versions 6.5.2 and below use an inefficient algorithm when parsing parameters for HTTP header values, potentially causing a DoS. The _parseparam function in httputil.py is used to parse specific HTTP header values, such as those in multipart/form-data and repeatedly calls string.count() within a nested loop while processing quoted semicolons. If an attacker sends a request with a large number of maliciously crafted parameters in a Content-Disposition header, the server's CPU usage increases quadratically (O(n²)) during parsing. Due to Tornado's single event loop architecture, a single malicious request can cause the entire server to become unresponsive for an extended period. This issue is fixed in version 6.5.3.

CVSS3: 7.5
0%
Низкий
4 месяца назад
redhat логотип
CVE-2025-67726

Tornado is a Python web framework and asynchronous networking library. Versions 6.5.2 and below use an inefficient algorithm when parsing parameters for HTTP header values, potentially causing a DoS. The _parseparam function in httputil.py is used to parse specific HTTP header values, such as those in multipart/form-data and repeatedly calls string.count() within a nested loop while processing quoted semicolons. If an attacker sends a request with a large number of maliciously crafted parameters in a Content-Disposition header, the server's CPU usage increases quadratically (O(n²)) during parsing. Due to Tornado's single event loop architecture, a single malicious request can cause the entire server to become unresponsive for an extended period. This issue is fixed in version 6.5.3.

CVSS3: 5.3
0%
Низкий
4 месяца назад
nvd логотип
CVE-2025-67726

Tornado is a Python web framework and asynchronous networking library. Versions 6.5.2 and below use an inefficient algorithm when parsing parameters for HTTP header values, potentially causing a DoS. The _parseparam function in httputil.py is used to parse specific HTTP header values, such as those in multipart/form-data and repeatedly calls string.count() within a nested loop while processing quoted semicolons. If an attacker sends a request with a large number of maliciously crafted parameters in a Content-Disposition header, the server's CPU usage increases quadratically (O(n²)) during parsing. Due to Tornado's single event loop architecture, a single malicious request can cause the entire server to become unresponsive for an extended period. This issue is fixed in version 6.5.3.

CVSS3: 7.5
0%
Низкий
4 месяца назад
debian логотип
CVE-2025-67726

Tornado is a Python web framework and asynchronous networking library. ...

CVSS3: 7.5
0%
Низкий
4 месяца назад
fstec логотип
BDU:2026-02928

Уязвимость функции _parseparam компонента httputil.py веб-фреймворка Python Tornado, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 7.5
0%
Низкий
4 месяца назад
suse-cvrf логотип
SUSE-SU-2026:0222-1

Security update for python-tornado

2 месяца назад
oracle-oval логотип
ELSA-2026-0930

ELSA-2026-0930: pcs security update (MODERATE)

3 месяца назад
suse-cvrf логотип
openSUSE-SU-2026:20015-1

Security update for python-tornado6

3 месяца назад
suse-cvrf логотип
SUSE-SU-2026:0010-1

Security update for python-tornado6

3 месяца назад
suse-cvrf логотип
openSUSE-SU-2026:20412-1

Security update for salt

13 дней назад
suse-cvrf логотип
SUSE-SU-2026:1030-1

Security update for salt

12 дней назад
suse-cvrf логотип
SUSE-SU-2026:1029-1

Security update for salt

12 дней назад
suse-cvrf логотип
SUSE-SU-2026:1028-1

Security update for salt

12 дней назад

Уязвимостей на страницу