Логотип exploitDog
bind:CVE-2025-13466
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2025-13466

Количество 4

Количество 4

ubuntu логотип

CVE-2025-13466

3 месяца назад

body-parser 2.2.0 is vulnerable to denial of service due to inefficient handling of URL-encoded bodies with very large numbers of parameters. An attacker can send payloads containing thousands of parameters within the default 100KB request size limit, causing elevated CPU and memory usage. This can lead to service slowdown or partial outages under sustained malicious traffic. This issue is addressed in version 2.2.1.

EPSS: Низкий
nvd логотип

CVE-2025-13466

3 месяца назад

body-parser 2.2.0 is vulnerable to denial of service due to inefficient handling of URL-encoded bodies with very large numbers of parameters. An attacker can send payloads containing thousands of parameters within the default 100KB request size limit, causing elevated CPU and memory usage. This can lead to service slowdown or partial outages under sustained malicious traffic. This issue is addressed in version 2.2.1.

EPSS: Низкий
debian логотип

CVE-2025-13466

3 месяца назад

body-parser 2.2.0 is vulnerable to denial of service due to inefficien ...

EPSS: Низкий
github логотип

GHSA-wqch-xfxh-vrr4

3 месяца назад

body-parser is vulnerable to denial of service when url encoding is used

CVSS3: 5.3
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2025-13466

body-parser 2.2.0 is vulnerable to denial of service due to inefficient handling of URL-encoded bodies with very large numbers of parameters. An attacker can send payloads containing thousands of parameters within the default 100KB request size limit, causing elevated CPU and memory usage. This can lead to service slowdown or partial outages under sustained malicious traffic. This issue is addressed in version 2.2.1.

0%
Низкий
3 месяца назад
nvd логотип
CVE-2025-13466

body-parser 2.2.0 is vulnerable to denial of service due to inefficient handling of URL-encoded bodies with very large numbers of parameters. An attacker can send payloads containing thousands of parameters within the default 100KB request size limit, causing elevated CPU and memory usage. This can lead to service slowdown or partial outages under sustained malicious traffic. This issue is addressed in version 2.2.1.

0%
Низкий
3 месяца назад
debian логотип
CVE-2025-13466

body-parser 2.2.0 is vulnerable to denial of service due to inefficien ...

0%
Низкий
3 месяца назад
github логотип
GHSA-wqch-xfxh-vrr4

body-parser is vulnerable to denial of service when url encoding is used

CVSS3: 5.3
0%
Низкий
3 месяца назад

Уязвимостей на страницу