HIGH 7.5
CVE-2025-13836
EN When reading an HTTP response from a server, if no read amount is specified, the default behavior will be to use Content-Length. This allows a malicious server to cause the client to read large amounts of data into memory, potentially causing OOM or other DoS.
CVSS v3
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
EPSS
0.2%
percentile 43.8%
Apps suivies affectées
Configurations CPE vulnérables
| Vendor | Produit | Plateforme | Versions | CPE 2.3 URI |
|---|---|---|---|---|
| python | python | Windows | <3.13.11 | cpe:2.3:a:python:python:*:*:*:*:*:*:*:* |
| python | python | Windows | — | cpe:2.3:a:python:python:3.14.0:-:*:*:*:*:*:* |
| python | python | Windows | — | cpe:2.3:a:python:python:3.15.0:alpha1:*:*:*:*:*:* |
| python | python | Windows | — | cpe:2.3:a:python:python:3.15.0:alpha2:*:*:*:*:*:* |