| 0 |
| url |
VCID-19q4-vzzb-8uca |
| vulnerability_id |
VCID-19q4-vzzb-8uca |
| summary |
|
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2026-34519 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00039 |
| scoring_system |
epss |
| scoring_elements |
0.11693 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.00039 |
| scoring_system |
epss |
| scoring_elements |
0.1165 |
| published_at |
2026-04-29T12:55:00Z |
|
| 2 |
| value |
0.00039 |
| scoring_system |
epss |
| scoring_elements |
0.11778 |
| published_at |
2026-04-24T12:55:00Z |
|
| 3 |
| value |
0.00039 |
| scoring_system |
epss |
| scoring_elements |
0.1181 |
| published_at |
2026-04-21T12:55:00Z |
|
| 4 |
| value |
0.00039 |
| scoring_system |
epss |
| scoring_elements |
0.11732 |
| published_at |
2026-04-26T12:55:00Z |
|
| 5 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.13732 |
| published_at |
2026-04-02T12:55:00Z |
|
| 6 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.13791 |
| published_at |
2026-04-04T12:55:00Z |
|
| 7 |
| value |
0.00059 |
| scoring_system |
epss |
| scoring_elements |
0.18287 |
| published_at |
2026-04-07T12:55:00Z |
|
| 8 |
| value |
0.00059 |
| scoring_system |
epss |
| scoring_elements |
0.18268 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00059 |
| scoring_system |
epss |
| scoring_elements |
0.18323 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00059 |
| scoring_system |
epss |
| scoring_elements |
0.18375 |
| published_at |
2026-04-12T12:55:00Z |
|
| 11 |
| value |
0.00059 |
| scoring_system |
epss |
| scoring_elements |
0.18422 |
| published_at |
2026-04-11T12:55:00Z |
|
| 12 |
| value |
0.00059 |
| scoring_system |
epss |
| scoring_elements |
0.18423 |
| published_at |
2026-04-09T12:55:00Z |
|
| 13 |
| value |
0.00059 |
| scoring_system |
epss |
| scoring_elements |
0.1837 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2026-34519 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
|
| fixed_packages |
|
| aliases |
CVE-2026-34519, GHSA-mwh4-6h8g-pg8w
|
| risk_score |
2.4 |
| exploitability |
0.5 |
| weighted_severity |
4.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-19q4-vzzb-8uca |
|
| 1 |
| url |
VCID-5f1f-mrwv-zucz |
| vulnerability_id |
VCID-5f1f-mrwv-zucz |
| summary |
|
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2026-34513 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0004 |
| scoring_system |
epss |
| scoring_elements |
0.122 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.0004 |
| scoring_system |
epss |
| scoring_elements |
0.12245 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16263 |
| published_at |
2026-04-24T12:55:00Z |
|
| 3 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16369 |
| published_at |
2026-04-21T12:55:00Z |
|
| 4 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16335 |
| published_at |
2026-04-18T12:55:00Z |
|
| 5 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16315 |
| published_at |
2026-04-16T12:55:00Z |
|
| 6 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16386 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16441 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16218 |
| published_at |
2026-04-29T12:55:00Z |
|
| 9 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16259 |
| published_at |
2026-04-26T12:55:00Z |
|
| 10 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16485 |
| published_at |
2026-04-11T12:55:00Z |
|
| 11 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16355 |
| published_at |
2026-04-07T12:55:00Z |
|
| 12 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.165 |
| published_at |
2026-04-09T12:55:00Z |
|
| 13 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16446 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2026-34513 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
|
| fixed_packages |
|
| aliases |
CVE-2026-34513, GHSA-hcc4-c3v8-rx92
|
| risk_score |
1.6 |
| exploitability |
0.5 |
| weighted_severity |
3.3 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-5f1f-mrwv-zucz |
|
| 2 |
| url |
VCID-bcuu-jvzt-6fhn |
| vulnerability_id |
VCID-bcuu-jvzt-6fhn |
| summary |
aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. Improper validation made it possible for an attacker to modify the HTTP request (e.g. to insert a new header) or create a new HTTP request if the attacker controls the HTTP version. The vulnerability only occurs if the attacker can control the HTTP version of the request. This issue has been patched in version 3.9.0. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-49081 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00457 |
| scoring_system |
epss |
| scoring_elements |
0.63902 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00457 |
| scoring_system |
epss |
| scoring_elements |
0.63928 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00457 |
| scoring_system |
epss |
| scoring_elements |
0.63886 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00457 |
| scoring_system |
epss |
| scoring_elements |
0.63983 |
| published_at |
2026-04-29T12:55:00Z |
|
| 4 |
| value |
0.00457 |
| scoring_system |
epss |
| scoring_elements |
0.63985 |
| published_at |
2026-04-26T12:55:00Z |
|
| 5 |
| value |
0.00457 |
| scoring_system |
epss |
| scoring_elements |
0.63973 |
| published_at |
2026-04-24T12:55:00Z |
|
| 6 |
| value |
0.00457 |
| scoring_system |
epss |
| scoring_elements |
0.63965 |
| published_at |
2026-04-18T12:55:00Z |
|
| 7 |
| value |
0.00457 |
| scoring_system |
epss |
| scoring_elements |
0.63937 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.00457 |
| scoring_system |
epss |
| scoring_elements |
0.63955 |
| published_at |
2026-04-21T12:55:00Z |
|
| 9 |
| value |
0.00457 |
| scoring_system |
epss |
| scoring_elements |
0.63967 |
| published_at |
2026-04-11T12:55:00Z |
|
| 10 |
| value |
0.00457 |
| scoring_system |
epss |
| scoring_elements |
0.63953 |
| published_at |
2026-04-12T12:55:00Z |
|
| 11 |
| value |
0.00457 |
| scoring_system |
epss |
| scoring_elements |
0.6392 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-49081 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
| reference_url |
https://github.com/aio-libs/aiohttp |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
7.2 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N |
|
| 1 |
| value |
6.9 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N |
|
| 2 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://github.com/aio-libs/aiohttp |
|
| 6 |
|
| 7 |
| reference_url |
https://github.com/aio-libs/aiohttp/pull/7835/files |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
5.3 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N |
|
| 1 |
| value |
7.2 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N |
|
| 2 |
| value |
6.9 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N |
|
| 3 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://github.com/aio-libs/aiohttp/pull/7835/files |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:deb/debian/python-aiohttp@3.8.4-1%2Bdeb12u1 |
| purl |
pkg:deb/debian/python-aiohttp@3.8.4-1%2Bdeb12u1 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-19q4-vzzb-8uca |
|
| 1 |
| vulnerability |
VCID-5f1f-mrwv-zucz |
|
| 2 |
| vulnerability |
VCID-cg9h-fysf-xygf |
|
| 3 |
| vulnerability |
VCID-d3pa-kwgz-vuag |
|
| 4 |
| vulnerability |
VCID-drqp-x9gc-2qd3 |
|
| 5 |
| vulnerability |
VCID-ekqy-23wg-5ugu |
|
| 6 |
| vulnerability |
VCID-ft9z-nd6x-27dz |
|
| 7 |
| vulnerability |
VCID-g4rj-1kzy-pkft |
|
| 8 |
| vulnerability |
VCID-hyh4-58xy-xfge |
|
| 9 |
| vulnerability |
VCID-jxqg-x9dh-z3hb |
|
| 10 |
| vulnerability |
VCID-k122-7d38-2ug5 |
|
| 11 |
| vulnerability |
VCID-kf4p-q9n9-ayhn |
|
| 12 |
| vulnerability |
VCID-peyu-fxyx-ayde |
|
| 13 |
| vulnerability |
VCID-qrus-4szm-c3bj |
|
| 14 |
| vulnerability |
VCID-qt9z-6kwe-wbht |
|
| 15 |
| vulnerability |
VCID-sjws-ddnq-fke2 |
|
| 16 |
| vulnerability |
VCID-t9gx-etxx-vkgb |
|
| 17 |
| vulnerability |
VCID-tmjw-8cdt-7yf7 |
|
| 18 |
| vulnerability |
VCID-tn28-662n-vug8 |
|
| 19 |
| vulnerability |
VCID-ttq3-65ny-skdg |
|
| 20 |
| vulnerability |
VCID-vqvz-jfqh-jkaz |
|
| 21 |
| vulnerability |
VCID-zm3a-mf2z-xfcm |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:deb/debian/python-aiohttp@3.8.4-1%252Bdeb12u1 |
|
|
| aliases |
CVE-2023-49081, GHSA-q3qx-c6g2-7pw2, PYSEC-2023-250
|
| risk_score |
3.2 |
| exploitability |
0.5 |
| weighted_severity |
6.5 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-bcuu-jvzt-6fhn |
|
| 3 |
| url |
VCID-bhkk-2b7c-wfgr |
| vulnerability_id |
VCID-bhkk-2b7c-wfgr |
| summary |
aiohttp vulnerable to Denial of Service when trying to parse malformed POST requests
### Summary
An attacker can send a specially crafted POST (multipart/form-data) request. When the aiohttp server processes it, the server will enter an infinite loop and be unable to process any further requests.
### Impact
An attacker can stop the application from serving requests after sending a single request.
-------
For anyone needing to patch older versions of aiohttp, the minimum diff needed to resolve the issue is (located in `_read_chunk_from_length()`):
```diff
diff --git a/aiohttp/multipart.py b/aiohttp/multipart.py
index 227be605c..71fc2654a 100644
--- a/aiohttp/multipart.py
+++ b/aiohttp/multipart.py
@@ -338,6 +338,8 @@ class BodyPartReader:
assert self._length is not None, "Content-Length required for chunked read"
chunk_size = min(size, self._length - self._read_bytes)
chunk = await self._content.read(chunk_size)
+ if self._content.at_eof():
+ self._at_eof = True
return chunk
async def _read_chunk_from_stream(self, size: int) -> bytes:
```
This does however introduce some very minor issues with handling form data. So, if possible, it would be recommended to also backport the changes in:
https://github.com/aio-libs/aiohttp/commit/cebe526b9c34dc3a3da9140409db63014bc4cf19
https://github.com/aio-libs/aiohttp/commit/7eecdff163ccf029fbb1ddc9de4169d4aaeb6597
https://github.com/aio-libs/aiohttp/commit/f21c6f2ca512a026ce7f0f6c6311f62d6a638866 |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2024-30251 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00331 |
| scoring_system |
epss |
| scoring_elements |
0.56051 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00331 |
| scoring_system |
epss |
| scoring_elements |
0.55973 |
| published_at |
2026-04-29T12:55:00Z |
|
| 2 |
| value |
0.00331 |
| scoring_system |
epss |
| scoring_elements |
0.55998 |
| published_at |
2026-04-26T12:55:00Z |
|
| 3 |
| value |
0.00331 |
| scoring_system |
epss |
| scoring_elements |
0.55978 |
| published_at |
2026-04-24T12:55:00Z |
|
| 4 |
| value |
0.00359 |
| scoring_system |
epss |
| scoring_elements |
0.58147 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.00359 |
| scoring_system |
epss |
| scoring_elements |
0.58159 |
| published_at |
2026-04-18T12:55:00Z |
|
| 6 |
| value |
0.00359 |
| scoring_system |
epss |
| scoring_elements |
0.58128 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.00359 |
| scoring_system |
epss |
| scoring_elements |
0.58097 |
| published_at |
2026-04-07T12:55:00Z |
|
| 8 |
| value |
0.00359 |
| scoring_system |
epss |
| scoring_elements |
0.58123 |
| published_at |
2026-04-04T12:55:00Z |
|
| 9 |
| value |
0.00359 |
| scoring_system |
epss |
| scoring_elements |
0.58101 |
| published_at |
2026-04-02T12:55:00Z |
|
| 10 |
| value |
0.00359 |
| scoring_system |
epss |
| scoring_elements |
0.58171 |
| published_at |
2026-04-11T12:55:00Z |
|
| 11 |
| value |
0.00359 |
| scoring_system |
epss |
| scoring_elements |
0.58155 |
| published_at |
2026-04-09T12:55:00Z |
|
| 12 |
| value |
0.00359 |
| scoring_system |
epss |
| scoring_elements |
0.58151 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2024-30251 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:deb/debian/python-aiohttp@3.8.4-1%2Bdeb12u1 |
| purl |
pkg:deb/debian/python-aiohttp@3.8.4-1%2Bdeb12u1 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-19q4-vzzb-8uca |
|
| 1 |
| vulnerability |
VCID-5f1f-mrwv-zucz |
|
| 2 |
| vulnerability |
VCID-cg9h-fysf-xygf |
|
| 3 |
| vulnerability |
VCID-d3pa-kwgz-vuag |
|
| 4 |
| vulnerability |
VCID-drqp-x9gc-2qd3 |
|
| 5 |
| vulnerability |
VCID-ekqy-23wg-5ugu |
|
| 6 |
| vulnerability |
VCID-ft9z-nd6x-27dz |
|
| 7 |
| vulnerability |
VCID-g4rj-1kzy-pkft |
|
| 8 |
| vulnerability |
VCID-hyh4-58xy-xfge |
|
| 9 |
| vulnerability |
VCID-jxqg-x9dh-z3hb |
|
| 10 |
| vulnerability |
VCID-k122-7d38-2ug5 |
|
| 11 |
| vulnerability |
VCID-kf4p-q9n9-ayhn |
|
| 12 |
| vulnerability |
VCID-peyu-fxyx-ayde |
|
| 13 |
| vulnerability |
VCID-qrus-4szm-c3bj |
|
| 14 |
| vulnerability |
VCID-qt9z-6kwe-wbht |
|
| 15 |
| vulnerability |
VCID-sjws-ddnq-fke2 |
|
| 16 |
| vulnerability |
VCID-t9gx-etxx-vkgb |
|
| 17 |
| vulnerability |
VCID-tmjw-8cdt-7yf7 |
|
| 18 |
| vulnerability |
VCID-tn28-662n-vug8 |
|
| 19 |
| vulnerability |
VCID-ttq3-65ny-skdg |
|
| 20 |
| vulnerability |
VCID-vqvz-jfqh-jkaz |
|
| 21 |
| vulnerability |
VCID-zm3a-mf2z-xfcm |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:deb/debian/python-aiohttp@3.8.4-1%252Bdeb12u1 |
|
|
| aliases |
CVE-2024-30251, GHSA-5m98-qgg9-wh84
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-bhkk-2b7c-wfgr |
|
| 4 |
| url |
VCID-cg9h-fysf-xygf |
| vulnerability_id |
VCID-cg9h-fysf-xygf |
| summary |
|
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2026-34516 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00038 |
| scoring_system |
epss |
| scoring_elements |
0.11462 |
| published_at |
2026-04-04T12:55:00Z |
|
| 1 |
| value |
0.0004 |
| scoring_system |
epss |
| scoring_elements |
0.122 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.0005 |
| scoring_system |
epss |
| scoring_elements |
0.1533 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.0005 |
| scoring_system |
epss |
| scoring_elements |
0.15325 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.0005 |
| scoring_system |
epss |
| scoring_elements |
0.15391 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.0005 |
| scoring_system |
epss |
| scoring_elements |
0.1543 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.0005 |
| scoring_system |
epss |
| scoring_elements |
0.15468 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.0005 |
| scoring_system |
epss |
| scoring_elements |
0.15418 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16335 |
| published_at |
2026-04-18T12:55:00Z |
|
| 9 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16259 |
| published_at |
2026-04-26T12:55:00Z |
|
| 10 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16263 |
| published_at |
2026-04-24T12:55:00Z |
|
| 11 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16369 |
| published_at |
2026-04-21T12:55:00Z |
|
| 12 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16315 |
| published_at |
2026-04-16T12:55:00Z |
|
| 13 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16218 |
| published_at |
2026-04-29T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2026-34516 |
|
| 2 |
|
| 3 |
|
| 4 |
| reference_url |
https://github.com/aio-libs/aiohttp |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
7.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
|
| 1 |
| value |
6.6 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U |
|
| 2 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://github.com/aio-libs/aiohttp |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
|
| fixed_packages |
|
| aliases |
CVE-2026-34516, GHSA-m5qp-6w8w-w647
|
| risk_score |
3.4 |
| exploitability |
0.5 |
| weighted_severity |
6.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-cg9h-fysf-xygf |
|
| 5 |
| url |
VCID-d3pa-kwgz-vuag |
| vulnerability_id |
VCID-d3pa-kwgz-vuag |
| summary |
AIOHTTP vulnerable to denial of service through large payloads
### Summary
A request can be crafted in such a way that an aiohttp server's memory fills up uncontrollably during processing.
### Impact
If an application includes a handler that uses the `Request.post()` method, an attacker may be able to freeze the server by exhausting the memory.
-----
Patch: https://github.com/aio-libs/aiohttp/commit/b7dbd35375aedbcd712cbae8ad513d56d11cce60 |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2025-69228 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.1943 |
| published_at |
2026-04-29T12:55:00Z |
|
| 1 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19467 |
| published_at |
2026-04-26T12:55:00Z |
|
| 2 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19479 |
| published_at |
2026-04-24T12:55:00Z |
|
| 3 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19584 |
| published_at |
2026-04-21T12:55:00Z |
|
| 4 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19572 |
| published_at |
2026-04-18T12:55:00Z |
|
| 5 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19565 |
| published_at |
2026-04-16T12:55:00Z |
|
| 6 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19637 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19835 |
| published_at |
2026-04-04T12:55:00Z |
|
| 8 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19557 |
| published_at |
2026-04-07T12:55:00Z |
|
| 9 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19689 |
| published_at |
2026-04-09T12:55:00Z |
|
| 10 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19587 |
| published_at |
2026-04-13T12:55:00Z |
|
| 11 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19782 |
| published_at |
2026-04-02T12:55:00Z |
|
| 12 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19646 |
| published_at |
2026-04-12T12:55:00Z |
|
| 13 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19695 |
| published_at |
2026-04-11T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2025-69228 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
|
| fixed_packages |
|
| aliases |
CVE-2025-69228, GHSA-6jhg-hg63-jvvf
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-d3pa-kwgz-vuag |
|
| 6 |
| url |
VCID-drqp-x9gc-2qd3 |
| vulnerability_id |
VCID-drqp-x9gc-2qd3 |
| summary |
|
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2026-34518 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00038 |
| scoring_system |
epss |
| scoring_elements |
0.11175 |
| published_at |
2026-04-29T12:55:00Z |
|
| 1 |
| value |
0.00038 |
| scoring_system |
epss |
| scoring_elements |
0.11236 |
| published_at |
2026-04-26T12:55:00Z |
|
| 2 |
| value |
0.00038 |
| scoring_system |
epss |
| scoring_elements |
0.11208 |
| published_at |
2026-04-18T12:55:00Z |
|
| 3 |
| value |
0.00038 |
| scoring_system |
epss |
| scoring_elements |
0.11277 |
| published_at |
2026-04-24T12:55:00Z |
|
| 4 |
| value |
0.00038 |
| scoring_system |
epss |
| scoring_elements |
0.11337 |
| published_at |
2026-04-21T12:55:00Z |
|
| 5 |
| value |
0.0004 |
| scoring_system |
epss |
| scoring_elements |
0.122 |
| published_at |
2026-04-02T12:55:00Z |
|
| 6 |
| value |
0.0004 |
| scoring_system |
epss |
| scoring_elements |
0.12245 |
| published_at |
2026-04-04T12:55:00Z |
|
| 7 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16355 |
| published_at |
2026-04-07T12:55:00Z |
|
| 8 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16325 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16386 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16446 |
| published_at |
2026-04-12T12:55:00Z |
|
| 11 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16485 |
| published_at |
2026-04-11T12:55:00Z |
|
| 12 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.165 |
| published_at |
2026-04-09T12:55:00Z |
|
| 13 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16441 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2026-34518 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
|
| fixed_packages |
|
| aliases |
CVE-2026-34518, GHSA-966j-vmvw-g2g9
|
| risk_score |
1.6 |
| exploitability |
0.5 |
| weighted_severity |
3.3 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-drqp-x9gc-2qd3 |
|
| 7 |
| url |
VCID-ft9z-nd6x-27dz |
| vulnerability_id |
VCID-ft9z-nd6x-27dz |
| summary |
AIOHTTP has unicode match groups in regexes for ASCII protocol elements
### Summary
The parser allows non-ASCII decimals to be present in the Range header.
### Impact
There is no known impact, but there is the possibility that there's a method to exploit a request smuggling vulnerability.
----
Patch: https://github.com/aio-libs/aiohttp/commit/c7b7a044f88c71cefda95ec75cdcfaa4792b3b96 |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2025-69225 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.13843 |
| published_at |
2026-04-29T12:55:00Z |
|
| 1 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.1391 |
| published_at |
2026-04-26T12:55:00Z |
|
| 2 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.13936 |
| published_at |
2026-04-24T12:55:00Z |
|
| 3 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.13935 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.14126 |
| published_at |
2026-04-04T12:55:00Z |
|
| 5 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.13932 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.14014 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.14067 |
| published_at |
2026-04-09T12:55:00Z |
|
| 8 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.14022 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.13985 |
| published_at |
2026-04-12T12:55:00Z |
|
| 10 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.13905 |
| published_at |
2026-04-21T12:55:00Z |
|
| 11 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.14072 |
| published_at |
2026-04-02T12:55:00Z |
|
| 12 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.13833 |
| published_at |
2026-04-18T12:55:00Z |
|
| 13 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.13839 |
| published_at |
2026-04-16T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2025-69225 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
|
| fixed_packages |
|
| aliases |
CVE-2025-69225, GHSA-mqqc-3gqh-h2x8
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
4.9 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-ft9z-nd6x-27dz |
|
| 8 |
| url |
VCID-g4rj-1kzy-pkft |
| vulnerability_id |
VCID-g4rj-1kzy-pkft |
| summary |
|
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2026-34525 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00085 |
| scoring_system |
epss |
| scoring_elements |
0.24814 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00085 |
| scoring_system |
epss |
| scoring_elements |
0.24852 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.001 |
| scoring_system |
epss |
| scoring_elements |
0.27783 |
| published_at |
2026-04-12T12:55:00Z |
|
| 3 |
| value |
0.001 |
| scoring_system |
epss |
| scoring_elements |
0.27825 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.001 |
| scoring_system |
epss |
| scoring_elements |
0.2782 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.001 |
| scoring_system |
epss |
| scoring_elements |
0.27777 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.001 |
| scoring_system |
epss |
| scoring_elements |
0.27709 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.001 |
| scoring_system |
epss |
| scoring_elements |
0.27734 |
| published_at |
2026-04-16T12:55:00Z |
|
| 8 |
| value |
0.001 |
| scoring_system |
epss |
| scoring_elements |
0.27726 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00119 |
| scoring_system |
epss |
| scoring_elements |
0.30498 |
| published_at |
2026-04-29T12:55:00Z |
|
| 10 |
| value |
0.00119 |
| scoring_system |
epss |
| scoring_elements |
0.30894 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00119 |
| scoring_system |
epss |
| scoring_elements |
0.3086 |
| published_at |
2026-04-21T12:55:00Z |
|
| 12 |
| value |
0.00119 |
| scoring_system |
epss |
| scoring_elements |
0.30698 |
| published_at |
2026-04-24T12:55:00Z |
|
| 13 |
| value |
0.00119 |
| scoring_system |
epss |
| scoring_elements |
0.30582 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2026-34525 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
|
| fixed_packages |
|
| aliases |
CVE-2026-34525, GHSA-c427-h43c-vf67
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-g4rj-1kzy-pkft |
|
| 9 |
| url |
VCID-hyh4-58xy-xfge |
| vulnerability_id |
VCID-hyh4-58xy-xfge |
| summary |
|
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2026-34517 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0004 |
| scoring_system |
epss |
| scoring_elements |
0.12245 |
| published_at |
2026-04-04T12:55:00Z |
|
| 1 |
| value |
0.0004 |
| scoring_system |
epss |
| scoring_elements |
0.122 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00051 |
| scoring_system |
epss |
| scoring_elements |
0.15771 |
| published_at |
2026-04-29T12:55:00Z |
|
| 3 |
| value |
0.00051 |
| scoring_system |
epss |
| scoring_elements |
0.15744 |
| published_at |
2026-04-16T12:55:00Z |
|
| 4 |
| value |
0.00051 |
| scoring_system |
epss |
| scoring_elements |
0.15753 |
| published_at |
2026-04-18T12:55:00Z |
|
| 5 |
| value |
0.00051 |
| scoring_system |
epss |
| scoring_elements |
0.15796 |
| published_at |
2026-04-21T12:55:00Z |
|
| 6 |
| value |
0.00051 |
| scoring_system |
epss |
| scoring_elements |
0.15817 |
| published_at |
2026-04-24T12:55:00Z |
|
| 7 |
| value |
0.00051 |
| scoring_system |
epss |
| scoring_elements |
0.15814 |
| published_at |
2026-04-26T12:55:00Z |
|
| 8 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16485 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16446 |
| published_at |
2026-04-12T12:55:00Z |
|
| 10 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16355 |
| published_at |
2026-04-07T12:55:00Z |
|
| 11 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16441 |
| published_at |
2026-04-08T12:55:00Z |
|
| 12 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.165 |
| published_at |
2026-04-09T12:55:00Z |
|
| 13 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16386 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2026-34517 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
|
| fixed_packages |
|
| aliases |
CVE-2026-34517, GHSA-3wq7-rqq7-wx6j
|
| risk_score |
1.6 |
| exploitability |
0.5 |
| weighted_severity |
3.3 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-hyh4-58xy-xfge |
|
| 10 |
| url |
VCID-jxqg-x9dh-z3hb |
| vulnerability_id |
VCID-jxqg-x9dh-z3hb |
| summary |
aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. Security-sensitive parts of the Python HTTP parser retained minor differences in allowable character sets, that must trigger error handling to robustly match frame boundaries of proxies in order to protect against injection of additional requests. Additionally, validation could trigger exceptions that were not handled consistently with processing of other malformed input. Being more lenient than internet standards require could, depending on deployment environment, assist in request smuggling. The unhandled exception could cause excessive resource consumption on the application server and/or its logging facilities. This vulnerability exists due to an incomplete fix for CVE-2023-47627. Version 3.9.2 fixes this vulnerability. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2024-23829 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00475 |
| scoring_system |
epss |
| scoring_elements |
0.64834 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
0.00475 |
| scoring_system |
epss |
| scoring_elements |
0.64843 |
| published_at |
2026-04-29T12:55:00Z |
|
| 2 |
| value |
0.00475 |
| scoring_system |
epss |
| scoring_elements |
0.64847 |
| published_at |
2026-04-26T12:55:00Z |
|
| 3 |
| value |
0.00475 |
| scoring_system |
epss |
| scoring_elements |
0.64816 |
| published_at |
2026-04-21T12:55:00Z |
|
| 4 |
| value |
0.00515 |
| scoring_system |
epss |
| scoring_elements |
0.6659 |
| published_at |
2026-04-02T12:55:00Z |
|
| 5 |
| value |
0.00515 |
| scoring_system |
epss |
| scoring_elements |
0.66588 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.00515 |
| scoring_system |
epss |
| scoring_elements |
0.66617 |
| published_at |
2026-04-04T12:55:00Z |
|
| 7 |
| value |
0.00515 |
| scoring_system |
epss |
| scoring_elements |
0.66674 |
| published_at |
2026-04-18T12:55:00Z |
|
| 8 |
| value |
0.00515 |
| scoring_system |
epss |
| scoring_elements |
0.6666 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00515 |
| scoring_system |
epss |
| scoring_elements |
0.66624 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00515 |
| scoring_system |
epss |
| scoring_elements |
0.66657 |
| published_at |
2026-04-12T12:55:00Z |
|
| 11 |
| value |
0.00515 |
| scoring_system |
epss |
| scoring_elements |
0.66669 |
| published_at |
2026-04-11T12:55:00Z |
|
| 12 |
| value |
0.00515 |
| scoring_system |
epss |
| scoring_elements |
0.6665 |
| published_at |
2026-04-09T12:55:00Z |
|
| 13 |
| value |
0.00515 |
| scoring_system |
epss |
| scoring_elements |
0.66636 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2024-23829 |
|
| 2 |
|
| 3 |
|
| 4 |
| reference_url |
https://github.com/aio-libs/aiohttp |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
6.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L |
|
| 1 |
| value |
6.9 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N |
|
| 2 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://github.com/aio-libs/aiohttp |
|
| 5 |
|
| 6 |
|
| 7 |
| reference_url |
https://github.com/aio-libs/aiohttp/pull/8074 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
6.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L |
|
| 1 |
| value |
6.9 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N |
|
| 2 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
| 3 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-02-01T16:40:08Z/ |
|
|
| url |
https://github.com/aio-libs/aiohttp/pull/8074 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:deb/debian/python-aiohttp@3.8.4-1%2Bdeb12u1 |
| purl |
pkg:deb/debian/python-aiohttp@3.8.4-1%2Bdeb12u1 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-19q4-vzzb-8uca |
|
| 1 |
| vulnerability |
VCID-5f1f-mrwv-zucz |
|
| 2 |
| vulnerability |
VCID-cg9h-fysf-xygf |
|
| 3 |
| vulnerability |
VCID-d3pa-kwgz-vuag |
|
| 4 |
| vulnerability |
VCID-drqp-x9gc-2qd3 |
|
| 5 |
| vulnerability |
VCID-ekqy-23wg-5ugu |
|
| 6 |
| vulnerability |
VCID-ft9z-nd6x-27dz |
|
| 7 |
| vulnerability |
VCID-g4rj-1kzy-pkft |
|
| 8 |
| vulnerability |
VCID-hyh4-58xy-xfge |
|
| 9 |
| vulnerability |
VCID-jxqg-x9dh-z3hb |
|
| 10 |
| vulnerability |
VCID-k122-7d38-2ug5 |
|
| 11 |
| vulnerability |
VCID-kf4p-q9n9-ayhn |
|
| 12 |
| vulnerability |
VCID-peyu-fxyx-ayde |
|
| 13 |
| vulnerability |
VCID-qrus-4szm-c3bj |
|
| 14 |
| vulnerability |
VCID-qt9z-6kwe-wbht |
|
| 15 |
| vulnerability |
VCID-sjws-ddnq-fke2 |
|
| 16 |
| vulnerability |
VCID-t9gx-etxx-vkgb |
|
| 17 |
| vulnerability |
VCID-tmjw-8cdt-7yf7 |
|
| 18 |
| vulnerability |
VCID-tn28-662n-vug8 |
|
| 19 |
| vulnerability |
VCID-ttq3-65ny-skdg |
|
| 20 |
| vulnerability |
VCID-vqvz-jfqh-jkaz |
|
| 21 |
| vulnerability |
VCID-zm3a-mf2z-xfcm |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:deb/debian/python-aiohttp@3.8.4-1%252Bdeb12u1 |
|
| 1 |
| url |
pkg:deb/debian/python-aiohttp@3.11.16-1 |
| purl |
pkg:deb/debian/python-aiohttp@3.11.16-1 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-19q4-vzzb-8uca |
|
| 1 |
| vulnerability |
VCID-5f1f-mrwv-zucz |
|
| 2 |
| vulnerability |
VCID-cg9h-fysf-xygf |
|
| 3 |
| vulnerability |
VCID-d3pa-kwgz-vuag |
|
| 4 |
| vulnerability |
VCID-drqp-x9gc-2qd3 |
|
| 5 |
| vulnerability |
VCID-ft9z-nd6x-27dz |
|
| 6 |
| vulnerability |
VCID-g4rj-1kzy-pkft |
|
| 7 |
| vulnerability |
VCID-hyh4-58xy-xfge |
|
| 8 |
| vulnerability |
VCID-k122-7d38-2ug5 |
|
| 9 |
| vulnerability |
VCID-kf4p-q9n9-ayhn |
|
| 10 |
| vulnerability |
VCID-peyu-fxyx-ayde |
|
| 11 |
| vulnerability |
VCID-qrus-4szm-c3bj |
|
| 12 |
| vulnerability |
VCID-qt9z-6kwe-wbht |
|
| 13 |
| vulnerability |
VCID-sjws-ddnq-fke2 |
|
| 14 |
| vulnerability |
VCID-t9gx-etxx-vkgb |
|
| 15 |
| vulnerability |
VCID-tmjw-8cdt-7yf7 |
|
| 16 |
| vulnerability |
VCID-vqvz-jfqh-jkaz |
|
| 17 |
| vulnerability |
VCID-zm3a-mf2z-xfcm |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:deb/debian/python-aiohttp@3.11.16-1 |
|
|
| aliases |
CVE-2024-23829, GHSA-8qpw-xqxj-h4r2, PYSEC-2024-26
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-jxqg-x9dh-z3hb |
|
| 11 |
| url |
VCID-k122-7d38-2ug5 |
| vulnerability_id |
VCID-k122-7d38-2ug5 |
| summary |
AIOHTTP is vulnerable to HTTP Request/Response Smuggling through incorrect parsing of chunked trailer sections
### Summary
The Python parser is vulnerable to a request smuggling vulnerability due to not parsing trailer sections of an HTTP request.
### Impact
If a pure Python version of aiohttp is installed (i.e. without the usual C extensions) or AIOHTTP_NO_EXTENSIONS is enabled, then an attacker may be able to execute a request smuggling attack to bypass certain firewalls or proxy protections.
----
Patch: https://github.com/aio-libs/aiohttp/commit/e8d774f635dc6d1cd3174d0e38891da5de0e2b6a |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2025-53643 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00078 |
| scoring_system |
epss |
| scoring_elements |
0.23245 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00078 |
| scoring_system |
epss |
| scoring_elements |
0.23152 |
| published_at |
2026-04-08T12:55:00Z |
|
| 2 |
| value |
0.00078 |
| scoring_system |
epss |
| scoring_elements |
0.23289 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00078 |
| scoring_system |
epss |
| scoring_elements |
0.23078 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00086 |
| scoring_system |
epss |
| scoring_elements |
0.24852 |
| published_at |
2026-04-18T12:55:00Z |
|
| 5 |
| value |
0.00086 |
| scoring_system |
epss |
| scoring_elements |
0.24858 |
| published_at |
2026-04-16T12:55:00Z |
|
| 6 |
| value |
0.00086 |
| scoring_system |
epss |
| scoring_elements |
0.24847 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.00086 |
| scoring_system |
epss |
| scoring_elements |
0.24901 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00086 |
| scoring_system |
epss |
| scoring_elements |
0.2494 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
0.00086 |
| scoring_system |
epss |
| scoring_elements |
0.24925 |
| published_at |
2026-04-09T12:55:00Z |
|
| 10 |
| value |
0.00086 |
| scoring_system |
epss |
| scoring_elements |
0.24716 |
| published_at |
2026-04-29T12:55:00Z |
|
| 11 |
| value |
0.00086 |
| scoring_system |
epss |
| scoring_elements |
0.24762 |
| published_at |
2026-04-26T12:55:00Z |
|
| 12 |
| value |
0.00086 |
| scoring_system |
epss |
| scoring_elements |
0.24773 |
| published_at |
2026-04-24T12:55:00Z |
|
| 13 |
| value |
0.00086 |
| scoring_system |
epss |
| scoring_elements |
0.2483 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2025-53643 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
|
| fixed_packages |
|
| aliases |
CVE-2025-53643, GHSA-9548-qrrj-x5pj
|
| risk_score |
1.6 |
| exploitability |
0.5 |
| weighted_severity |
3.3 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-k122-7d38-2ug5 |
|
| 12 |
| url |
VCID-kf4p-q9n9-ayhn |
| vulnerability_id |
VCID-kf4p-q9n9-ayhn |
| summary |
|
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2026-22815 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00038 |
| scoring_system |
epss |
| scoring_elements |
0.11462 |
| published_at |
2026-04-04T12:55:00Z |
|
| 1 |
| value |
0.0004 |
| scoring_system |
epss |
| scoring_elements |
0.122 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16263 |
| published_at |
2026-04-24T12:55:00Z |
|
| 3 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16369 |
| published_at |
2026-04-21T12:55:00Z |
|
| 4 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16335 |
| published_at |
2026-04-18T12:55:00Z |
|
| 5 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16315 |
| published_at |
2026-04-16T12:55:00Z |
|
| 6 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16346 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16218 |
| published_at |
2026-04-29T12:55:00Z |
|
| 8 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16259 |
| published_at |
2026-04-26T12:55:00Z |
|
| 9 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16475 |
| published_at |
2026-04-11T12:55:00Z |
|
| 10 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16491 |
| published_at |
2026-04-09T12:55:00Z |
|
| 11 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16432 |
| published_at |
2026-04-08T12:55:00Z |
|
| 12 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16375 |
| published_at |
2026-04-13T12:55:00Z |
|
| 13 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16436 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2026-22815 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
|
| fixed_packages |
|
| aliases |
CVE-2026-22815, GHSA-w2fm-2cpv-w7v5
|
| risk_score |
3.4 |
| exploitability |
0.5 |
| weighted_severity |
6.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-kf4p-q9n9-ayhn |
|
| 13 |
| url |
VCID-peyu-fxyx-ayde |
| vulnerability_id |
VCID-peyu-fxyx-ayde |
| summary |
AIOHTTP vulnerable to DoS through chunked messages
### Summary
Handling of chunked messages can result in excessive blocking CPU usage when receiving a large number of chunks.
### Impact
If an application makes use of the `request.read()` method in an endpoint, it may be possible for an attacker to cause the server to spend a moderate amount of blocking CPU time (e.g. 1 second) while processing the request. This could potentially lead to DoS as the server would be unable to handle other requests during that time.
-----
Patch: https://github.com/aio-libs/aiohttp/commit/dc3170b56904bdf814228fae70a5501a42a6c712
Patch: https://github.com/aio-libs/aiohttp/commit/4ed97a4e46eaf61bd0f05063245f613469700229 |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2025-69229 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16113 |
| published_at |
2026-04-29T12:55:00Z |
|
| 1 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16152 |
| published_at |
2026-04-26T12:55:00Z |
|
| 2 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16154 |
| published_at |
2026-04-24T12:55:00Z |
|
| 3 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16261 |
| published_at |
2026-04-21T12:55:00Z |
|
| 4 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16223 |
| published_at |
2026-04-18T12:55:00Z |
|
| 5 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16204 |
| published_at |
2026-04-16T12:55:00Z |
|
| 6 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16268 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16336 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16243 |
| published_at |
2026-04-07T12:55:00Z |
|
| 9 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16392 |
| published_at |
2026-04-09T12:55:00Z |
|
| 10 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16328 |
| published_at |
2026-04-08T12:55:00Z |
|
| 11 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16454 |
| published_at |
2026-04-04T12:55:00Z |
|
| 12 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16375 |
| published_at |
2026-04-11T12:55:00Z |
|
| 13 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16391 |
| published_at |
2026-04-02T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2025-69229 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
|
| fixed_packages |
|
| aliases |
CVE-2025-69229, GHSA-g84x-mcqj-x9qq
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-peyu-fxyx-ayde |
|
| 14 |
| url |
VCID-pmr9-w1fc-93cm |
| vulnerability_id |
VCID-pmr9-w1fc-93cm |
| summary |
aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. The HTTP parser in AIOHTTP has numerous problems with header parsing, which could lead to request smuggling. This parser is only used when AIOHTTP_NO_EXTENSIONS is enabled (or not using a prebuilt wheel). These bugs have been addressed in commit `d5c12ba89` which has been included in release version 3.8.6. Users are advised to upgrade. There are no known workarounds for these issues. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-47627 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00239 |
| scoring_system |
epss |
| scoring_elements |
0.46985 |
| published_at |
2026-04-26T12:55:00Z |
|
| 1 |
| value |
0.00239 |
| scoring_system |
epss |
| scoring_elements |
0.46974 |
| published_at |
2026-04-24T12:55:00Z |
|
| 2 |
| value |
0.00239 |
| scoring_system |
epss |
| scoring_elements |
0.46988 |
| published_at |
2026-04-21T12:55:00Z |
|
| 3 |
| value |
0.00239 |
| scoring_system |
epss |
| scoring_elements |
0.46937 |
| published_at |
2026-04-29T12:55:00Z |
|
| 4 |
| value |
0.0026 |
| scoring_system |
epss |
| scoring_elements |
0.49252 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.0026 |
| scoring_system |
epss |
| scoring_elements |
0.49307 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.0026 |
| scoring_system |
epss |
| scoring_elements |
0.49303 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.0026 |
| scoring_system |
epss |
| scoring_elements |
0.49295 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.0026 |
| scoring_system |
epss |
| scoring_elements |
0.49321 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
0.0026 |
| scoring_system |
epss |
| scoring_elements |
0.49271 |
| published_at |
2026-04-02T12:55:00Z |
|
| 10 |
| value |
0.0026 |
| scoring_system |
epss |
| scoring_elements |
0.49298 |
| published_at |
2026-04-13T12:55:00Z |
|
| 11 |
| value |
0.0026 |
| scoring_system |
epss |
| scoring_elements |
0.49342 |
| published_at |
2026-04-18T12:55:00Z |
|
| 12 |
| value |
0.0026 |
| scoring_system |
epss |
| scoring_elements |
0.49346 |
| published_at |
2026-04-16T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-47627 |
|
| 2 |
|
| 3 |
|
| 4 |
| reference_url |
https://github.com/aio-libs/aiohttp |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
5.3 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N |
|
| 1 |
| value |
6.9 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N |
|
| 2 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://github.com/aio-libs/aiohttp |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:deb/debian/python-aiohttp@3.8.4-1%2Bdeb12u1 |
| purl |
pkg:deb/debian/python-aiohttp@3.8.4-1%2Bdeb12u1 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-19q4-vzzb-8uca |
|
| 1 |
| vulnerability |
VCID-5f1f-mrwv-zucz |
|
| 2 |
| vulnerability |
VCID-cg9h-fysf-xygf |
|
| 3 |
| vulnerability |
VCID-d3pa-kwgz-vuag |
|
| 4 |
| vulnerability |
VCID-drqp-x9gc-2qd3 |
|
| 5 |
| vulnerability |
VCID-ekqy-23wg-5ugu |
|
| 6 |
| vulnerability |
VCID-ft9z-nd6x-27dz |
|
| 7 |
| vulnerability |
VCID-g4rj-1kzy-pkft |
|
| 8 |
| vulnerability |
VCID-hyh4-58xy-xfge |
|
| 9 |
| vulnerability |
VCID-jxqg-x9dh-z3hb |
|
| 10 |
| vulnerability |
VCID-k122-7d38-2ug5 |
|
| 11 |
| vulnerability |
VCID-kf4p-q9n9-ayhn |
|
| 12 |
| vulnerability |
VCID-peyu-fxyx-ayde |
|
| 13 |
| vulnerability |
VCID-qrus-4szm-c3bj |
|
| 14 |
| vulnerability |
VCID-qt9z-6kwe-wbht |
|
| 15 |
| vulnerability |
VCID-sjws-ddnq-fke2 |
|
| 16 |
| vulnerability |
VCID-t9gx-etxx-vkgb |
|
| 17 |
| vulnerability |
VCID-tmjw-8cdt-7yf7 |
|
| 18 |
| vulnerability |
VCID-tn28-662n-vug8 |
|
| 19 |
| vulnerability |
VCID-ttq3-65ny-skdg |
|
| 20 |
| vulnerability |
VCID-vqvz-jfqh-jkaz |
|
| 21 |
| vulnerability |
VCID-zm3a-mf2z-xfcm |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:deb/debian/python-aiohttp@3.8.4-1%252Bdeb12u1 |
|
|
| aliases |
CVE-2023-47627, GHSA-gfw2-4jvh-wgfg, PYSEC-2023-246
|
| risk_score |
3.4 |
| exploitability |
0.5 |
| weighted_severity |
6.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-pmr9-w1fc-93cm |
|
| 15 |
| url |
VCID-pqus-ew4j-k7da |
| vulnerability_id |
VCID-pqus-ew4j-k7da |
| summary |
aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. When using aiohttp as a web server and configuring static routes, it is necessary to specify the root path for static files. Additionally, the option 'follow_symlinks' can be used to determine whether to follow symbolic links outside the static root directory. When 'follow_symlinks' is set to True, there is no validation to check if reading a file is within the root directory. This can lead to directory traversal vulnerabilities, resulting in unauthorized access to arbitrary files on the system, even when symlinks are not present. Disabling follow_symlinks and using a reverse proxy are encouraged mitigations. Version 3.9.2 fixes this issue. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2024-23334 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.93482 |
| scoring_system |
epss |
| scoring_elements |
0.99823 |
| published_at |
2026-04-16T12:55:00Z |
|
| 1 |
| value |
0.93482 |
| scoring_system |
epss |
| scoring_elements |
0.99822 |
| published_at |
2026-04-11T12:55:00Z |
|
| 2 |
| value |
0.93482 |
| scoring_system |
epss |
| scoring_elements |
0.99828 |
| published_at |
2026-04-29T12:55:00Z |
|
| 3 |
| value |
0.93482 |
| scoring_system |
epss |
| scoring_elements |
0.99821 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.93482 |
| scoring_system |
epss |
| scoring_elements |
0.99827 |
| published_at |
2026-04-26T12:55:00Z |
|
| 5 |
| value |
0.93482 |
| scoring_system |
epss |
| scoring_elements |
0.99826 |
| published_at |
2026-04-24T12:55:00Z |
|
| 6 |
| value |
0.93482 |
| scoring_system |
epss |
| scoring_elements |
0.99825 |
| published_at |
2026-04-21T12:55:00Z |
|
| 7 |
| value |
0.93482 |
| scoring_system |
epss |
| scoring_elements |
0.99824 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2024-23334 |
|
| 2 |
|
| 3 |
|
| 4 |
| reference_url |
https://github.com/aio-libs/aiohttp |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
5.9 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N |
|
| 1 |
| value |
8.2 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://github.com/aio-libs/aiohttp |
|
| 5 |
|
| 6 |
| reference_url |
https://github.com/aio-libs/aiohttp/pull/8079 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
5.9 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N |
|
| 1 |
| value |
7.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N |
|
| 2 |
| value |
8.2 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N |
|
| 3 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
| 4 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-30T19:29:24Z/ |
|
|
| url |
https://github.com/aio-libs/aiohttp/pull/8079 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
| reference_url |
https://www.exploit-db.com/exploits/52474 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
5.9 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N |
|
| 1 |
| value |
8.2 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://www.exploit-db.com/exploits/52474 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:deb/debian/python-aiohttp@3.8.4-1%2Bdeb12u1 |
| purl |
pkg:deb/debian/python-aiohttp@3.8.4-1%2Bdeb12u1 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-19q4-vzzb-8uca |
|
| 1 |
| vulnerability |
VCID-5f1f-mrwv-zucz |
|
| 2 |
| vulnerability |
VCID-cg9h-fysf-xygf |
|
| 3 |
| vulnerability |
VCID-d3pa-kwgz-vuag |
|
| 4 |
| vulnerability |
VCID-drqp-x9gc-2qd3 |
|
| 5 |
| vulnerability |
VCID-ekqy-23wg-5ugu |
|
| 6 |
| vulnerability |
VCID-ft9z-nd6x-27dz |
|
| 7 |
| vulnerability |
VCID-g4rj-1kzy-pkft |
|
| 8 |
| vulnerability |
VCID-hyh4-58xy-xfge |
|
| 9 |
| vulnerability |
VCID-jxqg-x9dh-z3hb |
|
| 10 |
| vulnerability |
VCID-k122-7d38-2ug5 |
|
| 11 |
| vulnerability |
VCID-kf4p-q9n9-ayhn |
|
| 12 |
| vulnerability |
VCID-peyu-fxyx-ayde |
|
| 13 |
| vulnerability |
VCID-qrus-4szm-c3bj |
|
| 14 |
| vulnerability |
VCID-qt9z-6kwe-wbht |
|
| 15 |
| vulnerability |
VCID-sjws-ddnq-fke2 |
|
| 16 |
| vulnerability |
VCID-t9gx-etxx-vkgb |
|
| 17 |
| vulnerability |
VCID-tmjw-8cdt-7yf7 |
|
| 18 |
| vulnerability |
VCID-tn28-662n-vug8 |
|
| 19 |
| vulnerability |
VCID-ttq3-65ny-skdg |
|
| 20 |
| vulnerability |
VCID-vqvz-jfqh-jkaz |
|
| 21 |
| vulnerability |
VCID-zm3a-mf2z-xfcm |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:deb/debian/python-aiohttp@3.8.4-1%252Bdeb12u1 |
|
|
| aliases |
CVE-2024-23334, GHSA-5h86-8mv2-jq9f, PYSEC-2024-24
|
| risk_score |
10.0 |
| exploitability |
2.0 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-pqus-ew4j-k7da |
|
| 16 |
| url |
VCID-qrus-4szm-c3bj |
| vulnerability_id |
VCID-qrus-4szm-c3bj |
| summary |
AIOHTTP's unicode processing of header values could cause parsing discrepancies
### Summary
The Python HTTP parser may allow a request smuggling attack with the presence of non-ASCII characters.
### Impact
If a pure Python version of aiohttp is installed (i.e. without the usual C extensions) or AIOHTTP_NO_EXTENSIONS is enabled, then an attacker may be able to execute a request smuggling attack to bypass certain firewalls or proxy protections.
------
Patch: https://github.com/aio-libs/aiohttp/commit/32677f2adfd907420c078dda6b79225c6f4ebce0 |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2025-69224 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00043 |
| scoring_system |
epss |
| scoring_elements |
0.13124 |
| published_at |
2026-04-29T12:55:00Z |
|
| 1 |
| value |
0.00043 |
| scoring_system |
epss |
| scoring_elements |
0.13228 |
| published_at |
2026-04-26T12:55:00Z |
|
| 2 |
| value |
0.00043 |
| scoring_system |
epss |
| scoring_elements |
0.13256 |
| published_at |
2026-04-24T12:55:00Z |
|
| 3 |
| value |
0.00043 |
| scoring_system |
epss |
| scoring_elements |
0.13251 |
| published_at |
2026-04-21T12:55:00Z |
|
| 4 |
| value |
0.00043 |
| scoring_system |
epss |
| scoring_elements |
0.13164 |
| published_at |
2026-04-18T12:55:00Z |
|
| 5 |
| value |
0.00043 |
| scoring_system |
epss |
| scoring_elements |
0.13165 |
| published_at |
2026-04-16T12:55:00Z |
|
| 6 |
| value |
0.00043 |
| scoring_system |
epss |
| scoring_elements |
0.13259 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.00043 |
| scoring_system |
epss |
| scoring_elements |
0.13308 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00043 |
| scoring_system |
epss |
| scoring_elements |
0.13243 |
| published_at |
2026-04-07T12:55:00Z |
|
| 9 |
| value |
0.00043 |
| scoring_system |
epss |
| scoring_elements |
0.13325 |
| published_at |
2026-04-08T12:55:00Z |
|
| 10 |
| value |
0.00043 |
| scoring_system |
epss |
| scoring_elements |
0.13447 |
| published_at |
2026-04-04T12:55:00Z |
|
| 11 |
| value |
0.00043 |
| scoring_system |
epss |
| scoring_elements |
0.13383 |
| published_at |
2026-04-02T12:55:00Z |
|
| 12 |
| value |
0.00043 |
| scoring_system |
epss |
| scoring_elements |
0.13346 |
| published_at |
2026-04-11T12:55:00Z |
|
| 13 |
| value |
0.00043 |
| scoring_system |
epss |
| scoring_elements |
0.13376 |
| published_at |
2026-04-09T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2025-69224 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
|
| fixed_packages |
|
| aliases |
CVE-2025-69224, GHSA-69f9-5gxw-wvc2
|
| risk_score |
2.9 |
| exploitability |
0.5 |
| weighted_severity |
5.7 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-qrus-4szm-c3bj |
|
| 17 |
| url |
VCID-qt9z-6kwe-wbht |
| vulnerability_id |
VCID-qt9z-6kwe-wbht |
| summary |
|
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2026-34514 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00039 |
| scoring_system |
epss |
| scoring_elements |
0.1165 |
| published_at |
2026-04-29T12:55:00Z |
|
| 1 |
| value |
0.00039 |
| scoring_system |
epss |
| scoring_elements |
0.11693 |
| published_at |
2026-04-18T12:55:00Z |
|
| 2 |
| value |
0.00039 |
| scoring_system |
epss |
| scoring_elements |
0.11694 |
| published_at |
2026-04-16T12:55:00Z |
|
| 3 |
| value |
0.00039 |
| scoring_system |
epss |
| scoring_elements |
0.11732 |
| published_at |
2026-04-26T12:55:00Z |
|
| 4 |
| value |
0.00039 |
| scoring_system |
epss |
| scoring_elements |
0.11778 |
| published_at |
2026-04-24T12:55:00Z |
|
| 5 |
| value |
0.00039 |
| scoring_system |
epss |
| scoring_elements |
0.1181 |
| published_at |
2026-04-21T12:55:00Z |
|
| 6 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.13732 |
| published_at |
2026-04-02T12:55:00Z |
|
| 7 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.13791 |
| published_at |
2026-04-04T12:55:00Z |
|
| 8 |
| value |
0.00059 |
| scoring_system |
epss |
| scoring_elements |
0.18323 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00059 |
| scoring_system |
epss |
| scoring_elements |
0.18287 |
| published_at |
2026-04-07T12:55:00Z |
|
| 10 |
| value |
0.00059 |
| scoring_system |
epss |
| scoring_elements |
0.18375 |
| published_at |
2026-04-12T12:55:00Z |
|
| 11 |
| value |
0.00059 |
| scoring_system |
epss |
| scoring_elements |
0.18423 |
| published_at |
2026-04-09T12:55:00Z |
|
| 12 |
| value |
0.00059 |
| scoring_system |
epss |
| scoring_elements |
0.1837 |
| published_at |
2026-04-08T12:55:00Z |
|
| 13 |
| value |
0.00059 |
| scoring_system |
epss |
| scoring_elements |
0.18422 |
| published_at |
2026-04-11T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2026-34514 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
|
| fixed_packages |
|
| aliases |
CVE-2026-34514, GHSA-2vrm-gr82-f7m5
|
| risk_score |
2.4 |
| exploitability |
0.5 |
| weighted_severity |
4.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-qt9z-6kwe-wbht |
|
| 18 |
| url |
VCID-sjws-ddnq-fke2 |
| vulnerability_id |
VCID-sjws-ddnq-fke2 |
| summary |
AIOHTTP's HTTP Parser auto_decompress feature is vulnerable to zip bomb
### Summary
A zip bomb can be used to execute a DoS against the aiohttp server.
### Impact
An attacker may be able to send a compressed request that when decompressed by aiohttp could exhaust the host's memory.
------
Patch: https://github.com/aio-libs/aiohttp/commit/2b920c39002cee0ec5b402581779bbaaf7c9138a |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2025-69223 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.1943 |
| published_at |
2026-04-29T12:55:00Z |
|
| 1 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19467 |
| published_at |
2026-04-26T12:55:00Z |
|
| 2 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19479 |
| published_at |
2026-04-24T12:55:00Z |
|
| 3 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19584 |
| published_at |
2026-04-21T12:55:00Z |
|
| 4 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19572 |
| published_at |
2026-04-18T12:55:00Z |
|
| 5 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19565 |
| published_at |
2026-04-16T12:55:00Z |
|
| 6 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19637 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19835 |
| published_at |
2026-04-04T12:55:00Z |
|
| 8 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19557 |
| published_at |
2026-04-07T12:55:00Z |
|
| 9 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19689 |
| published_at |
2026-04-09T12:55:00Z |
|
| 10 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19587 |
| published_at |
2026-04-13T12:55:00Z |
|
| 11 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19782 |
| published_at |
2026-04-02T12:55:00Z |
|
| 12 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19646 |
| published_at |
2026-04-12T12:55:00Z |
|
| 13 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19695 |
| published_at |
2026-04-11T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2025-69223 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
|
| fixed_packages |
|
| aliases |
CVE-2025-69223, GHSA-6mq8-rvhq-8wgg
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-sjws-ddnq-fke2 |
|
| 19 |
| url |
VCID-t2aj-cszz-tyd7 |
| vulnerability_id |
VCID-t2aj-cszz-tyd7 |
| summary |
aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. Affected versions of aiohttp have a security vulnerability regarding the inconsistent interpretation of the http protocol. HTTP/1.1 is a persistent protocol, if both Content-Length(CL) and Transfer-Encoding(TE) header values are present it can lead to incorrect interpretation of two entities that parse the HTTP and we can poison other sockets with this incorrect interpretation. A possible Proof-of-Concept (POC) would be a configuration with a reverse proxy(frontend) that accepts both CL and TE headers and aiohttp as backend. As aiohttp parses anything with chunked, we can pass a chunked123 as TE, the frontend entity will ignore this header and will parse Content-Length. The impact of this vulnerability is that it is possible to bypass any proxy rule, poisoning sockets to other users like passing Authentication Headers, also if it is present an Open Redirect an attacker could combine it to redirect random users to another website and log the request. This vulnerability has been addressed in release 3.8.0 of aiohttp. Users are advised to upgrade. There are no known workarounds for this vulnerability. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-47641 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00319 |
| scoring_system |
epss |
| scoring_elements |
0.54908 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00319 |
| scoring_system |
epss |
| scoring_elements |
0.54965 |
| published_at |
2026-04-18T12:55:00Z |
|
| 2 |
| value |
0.00319 |
| scoring_system |
epss |
| scoring_elements |
0.54954 |
| published_at |
2026-04-08T12:55:00Z |
|
| 3 |
| value |
0.00319 |
| scoring_system |
epss |
| scoring_elements |
0.54953 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
0.00319 |
| scoring_system |
epss |
| scoring_elements |
0.54947 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.00319 |
| scoring_system |
epss |
| scoring_elements |
0.54919 |
| published_at |
2026-04-24T12:55:00Z |
|
| 6 |
| value |
0.00319 |
| scoring_system |
epss |
| scoring_elements |
0.54943 |
| published_at |
2026-04-21T12:55:00Z |
|
| 7 |
| value |
0.00319 |
| scoring_system |
epss |
| scoring_elements |
0.54961 |
| published_at |
2026-04-16T12:55:00Z |
|
| 8 |
| value |
0.00319 |
| scoring_system |
epss |
| scoring_elements |
0.54924 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00319 |
| scoring_system |
epss |
| scoring_elements |
0.54934 |
| published_at |
2026-04-04T12:55:00Z |
|
| 10 |
| value |
0.00319 |
| scoring_system |
epss |
| scoring_elements |
0.54904 |
| published_at |
2026-04-07T12:55:00Z |
|
| 11 |
| value |
0.00358 |
| scoring_system |
epss |
| scoring_elements |
0.57972 |
| published_at |
2026-04-29T12:55:00Z |
|
| 12 |
| value |
0.00358 |
| scoring_system |
epss |
| scoring_elements |
0.57989 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-47641 |
|
| 2 |
|
| 3 |
|
| 4 |
| reference_url |
https://github.com/aio-libs/aiohttp |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
3.4 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N |
|
| 1 |
| value |
2.3 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:L/VI:N/VA:N/SC:L/SI:N/SA:N |
|
| 2 |
| value |
LOW |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://github.com/aio-libs/aiohttp |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:deb/debian/python-aiohttp@3.8.4-1%2Bdeb12u1 |
| purl |
pkg:deb/debian/python-aiohttp@3.8.4-1%2Bdeb12u1 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-19q4-vzzb-8uca |
|
| 1 |
| vulnerability |
VCID-5f1f-mrwv-zucz |
|
| 2 |
| vulnerability |
VCID-cg9h-fysf-xygf |
|
| 3 |
| vulnerability |
VCID-d3pa-kwgz-vuag |
|
| 4 |
| vulnerability |
VCID-drqp-x9gc-2qd3 |
|
| 5 |
| vulnerability |
VCID-ekqy-23wg-5ugu |
|
| 6 |
| vulnerability |
VCID-ft9z-nd6x-27dz |
|
| 7 |
| vulnerability |
VCID-g4rj-1kzy-pkft |
|
| 8 |
| vulnerability |
VCID-hyh4-58xy-xfge |
|
| 9 |
| vulnerability |
VCID-jxqg-x9dh-z3hb |
|
| 10 |
| vulnerability |
VCID-k122-7d38-2ug5 |
|
| 11 |
| vulnerability |
VCID-kf4p-q9n9-ayhn |
|
| 12 |
| vulnerability |
VCID-peyu-fxyx-ayde |
|
| 13 |
| vulnerability |
VCID-qrus-4szm-c3bj |
|
| 14 |
| vulnerability |
VCID-qt9z-6kwe-wbht |
|
| 15 |
| vulnerability |
VCID-sjws-ddnq-fke2 |
|
| 16 |
| vulnerability |
VCID-t9gx-etxx-vkgb |
|
| 17 |
| vulnerability |
VCID-tmjw-8cdt-7yf7 |
|
| 18 |
| vulnerability |
VCID-tn28-662n-vug8 |
|
| 19 |
| vulnerability |
VCID-ttq3-65ny-skdg |
|
| 20 |
| vulnerability |
VCID-vqvz-jfqh-jkaz |
|
| 21 |
| vulnerability |
VCID-zm3a-mf2z-xfcm |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:deb/debian/python-aiohttp@3.8.4-1%252Bdeb12u1 |
|
|
| aliases |
CVE-2023-47641, GHSA-xx9p-xxvh-7g8j, PYSEC-2023-247
|
| risk_score |
3.0 |
| exploitability |
0.5 |
| weighted_severity |
5.9 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-t2aj-cszz-tyd7 |
|
| 20 |
| url |
VCID-t9gx-etxx-vkgb |
| vulnerability_id |
VCID-t9gx-etxx-vkgb |
| summary |
AIOHTTP vulnerable to DoS when bypassing asserts
### Summary
When assert statements are bypassed, an infinite loop can occur, resulting in a DoS attack when processing a POST body.
### Impact
If optimisations are enabled (`-O` or `PYTHONOPTIMIZE=1`), and the application includes a handler that uses the `Request.post()` method, then an attacker may be able to execute a DoS attack with a specially crafted message.
------
Patch: https://github.com/aio-libs/aiohttp/commit/bc1319ec3cbff9438a758951a30907b072561259 |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2025-69227 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.1943 |
| published_at |
2026-04-29T12:55:00Z |
|
| 1 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19467 |
| published_at |
2026-04-26T12:55:00Z |
|
| 2 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19479 |
| published_at |
2026-04-24T12:55:00Z |
|
| 3 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19584 |
| published_at |
2026-04-21T12:55:00Z |
|
| 4 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19572 |
| published_at |
2026-04-18T12:55:00Z |
|
| 5 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19565 |
| published_at |
2026-04-16T12:55:00Z |
|
| 6 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19637 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19835 |
| published_at |
2026-04-04T12:55:00Z |
|
| 8 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19557 |
| published_at |
2026-04-07T12:55:00Z |
|
| 9 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19689 |
| published_at |
2026-04-09T12:55:00Z |
|
| 10 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19587 |
| published_at |
2026-04-13T12:55:00Z |
|
| 11 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19782 |
| published_at |
2026-04-02T12:55:00Z |
|
| 12 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19646 |
| published_at |
2026-04-12T12:55:00Z |
|
| 13 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19695 |
| published_at |
2026-04-11T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2025-69227 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
|
| fixed_packages |
|
| aliases |
CVE-2025-69227, GHSA-jj3x-wxrx-4x23
|
| risk_score |
3.4 |
| exploitability |
0.5 |
| weighted_severity |
6.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-t9gx-etxx-vkgb |
|
| 21 |
| url |
VCID-tmjw-8cdt-7yf7 |
| vulnerability_id |
VCID-tmjw-8cdt-7yf7 |
| summary |
|
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2026-34520 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00042 |
| scoring_system |
epss |
| scoring_elements |
0.13027 |
| published_at |
2026-04-04T12:55:00Z |
|
| 1 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.13732 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00055 |
| scoring_system |
epss |
| scoring_elements |
0.17325 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00055 |
| scoring_system |
epss |
| scoring_elements |
0.17329 |
| published_at |
2026-04-16T12:55:00Z |
|
| 4 |
| value |
0.00055 |
| scoring_system |
epss |
| scoring_elements |
0.17387 |
| published_at |
2026-04-13T12:55:00Z |
|
| 5 |
| value |
0.00055 |
| scoring_system |
epss |
| scoring_elements |
0.17441 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.00055 |
| scoring_system |
epss |
| scoring_elements |
0.17488 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00055 |
| scoring_system |
epss |
| scoring_elements |
0.17476 |
| published_at |
2026-04-09T12:55:00Z |
|
| 8 |
| value |
0.00055 |
| scoring_system |
epss |
| scoring_elements |
0.17416 |
| published_at |
2026-04-08T12:55:00Z |
|
| 9 |
| value |
0.00057 |
| scoring_system |
epss |
| scoring_elements |
0.17799 |
| published_at |
2026-04-29T12:55:00Z |
|
| 10 |
| value |
0.00057 |
| scoring_system |
epss |
| scoring_elements |
0.17948 |
| published_at |
2026-04-21T12:55:00Z |
|
| 11 |
| value |
0.00057 |
| scoring_system |
epss |
| scoring_elements |
0.17912 |
| published_at |
2026-04-18T12:55:00Z |
|
| 12 |
| value |
0.00057 |
| scoring_system |
epss |
| scoring_elements |
0.17836 |
| published_at |
2026-04-26T12:55:00Z |
|
| 13 |
| value |
0.00057 |
| scoring_system |
epss |
| scoring_elements |
0.17858 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2026-34520 |
|
| 2 |
|
| 3 |
|
| 4 |
| reference_url |
https://github.com/aio-libs/aiohttp |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
9.1 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H |
|
| 1 |
| value |
2.7 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:U |
|
| 2 |
| value |
LOW |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://github.com/aio-libs/aiohttp |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
|
| fixed_packages |
|
| aliases |
CVE-2026-34520, GHSA-63hf-3vf5-4wqf
|
| risk_score |
4.1 |
| exploitability |
0.5 |
| weighted_severity |
8.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-tmjw-8cdt-7yf7 |
|
| 22 |
| url |
VCID-tn28-662n-vug8 |
| vulnerability_id |
VCID-tn28-662n-vug8 |
| summary |
aiohttp Cross-site Scripting vulnerability on index pages for static file handling
### Summary
A XSS vulnerability exists on index pages for static file handling.
### Details
When using `web.static(..., show_index=True)`, the resulting index pages do not escape file names.
If users can upload files with arbitrary filenames to the static directory, the server is vulnerable to XSS attacks.
### Workaround
We have always recommended using a reverse proxy server (e.g. nginx) for serving static files. Users following the recommendation are unaffected.
Other users can disable `show_index` if unable to upgrade.
-----
Patch: https://github.com/aio-libs/aiohttp/pull/8319/files |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2024-27306 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00593 |
| scoring_system |
epss |
| scoring_elements |
0.69288 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00593 |
| scoring_system |
epss |
| scoring_elements |
0.6934 |
| published_at |
2026-04-24T12:55:00Z |
|
| 2 |
| value |
0.00709 |
| scoring_system |
epss |
| scoring_elements |
0.72284 |
| published_at |
2026-04-29T12:55:00Z |
|
| 3 |
| value |
0.00709 |
| scoring_system |
epss |
| scoring_elements |
0.72288 |
| published_at |
2026-04-26T12:55:00Z |
|
| 4 |
| value |
0.00749 |
| scoring_system |
epss |
| scoring_elements |
0.73066 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00749 |
| scoring_system |
epss |
| scoring_elements |
0.73167 |
| published_at |
2026-04-18T12:55:00Z |
|
| 6 |
| value |
0.00749 |
| scoring_system |
epss |
| scoring_elements |
0.73158 |
| published_at |
2026-04-16T12:55:00Z |
|
| 7 |
| value |
0.00749 |
| scoring_system |
epss |
| scoring_elements |
0.73117 |
| published_at |
2026-04-09T12:55:00Z |
|
| 8 |
| value |
0.00749 |
| scoring_system |
epss |
| scoring_elements |
0.73103 |
| published_at |
2026-04-08T12:55:00Z |
|
| 9 |
| value |
0.00749 |
| scoring_system |
epss |
| scoring_elements |
0.73092 |
| published_at |
2026-04-04T12:55:00Z |
|
| 10 |
| value |
0.00749 |
| scoring_system |
epss |
| scoring_elements |
0.73072 |
| published_at |
2026-04-02T12:55:00Z |
|
| 11 |
| value |
0.00749 |
| scoring_system |
epss |
| scoring_elements |
0.73115 |
| published_at |
2026-04-13T12:55:00Z |
|
| 12 |
| value |
0.00749 |
| scoring_system |
epss |
| scoring_elements |
0.73121 |
| published_at |
2026-04-12T12:55:00Z |
|
| 13 |
| value |
0.00749 |
| scoring_system |
epss |
| scoring_elements |
0.73141 |
| published_at |
2026-04-11T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2024-27306 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:deb/debian/python-aiohttp@3.8.4-1%2Bdeb12u1 |
| purl |
pkg:deb/debian/python-aiohttp@3.8.4-1%2Bdeb12u1 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-19q4-vzzb-8uca |
|
| 1 |
| vulnerability |
VCID-5f1f-mrwv-zucz |
|
| 2 |
| vulnerability |
VCID-cg9h-fysf-xygf |
|
| 3 |
| vulnerability |
VCID-d3pa-kwgz-vuag |
|
| 4 |
| vulnerability |
VCID-drqp-x9gc-2qd3 |
|
| 5 |
| vulnerability |
VCID-ekqy-23wg-5ugu |
|
| 6 |
| vulnerability |
VCID-ft9z-nd6x-27dz |
|
| 7 |
| vulnerability |
VCID-g4rj-1kzy-pkft |
|
| 8 |
| vulnerability |
VCID-hyh4-58xy-xfge |
|
| 9 |
| vulnerability |
VCID-jxqg-x9dh-z3hb |
|
| 10 |
| vulnerability |
VCID-k122-7d38-2ug5 |
|
| 11 |
| vulnerability |
VCID-kf4p-q9n9-ayhn |
|
| 12 |
| vulnerability |
VCID-peyu-fxyx-ayde |
|
| 13 |
| vulnerability |
VCID-qrus-4szm-c3bj |
|
| 14 |
| vulnerability |
VCID-qt9z-6kwe-wbht |
|
| 15 |
| vulnerability |
VCID-sjws-ddnq-fke2 |
|
| 16 |
| vulnerability |
VCID-t9gx-etxx-vkgb |
|
| 17 |
| vulnerability |
VCID-tmjw-8cdt-7yf7 |
|
| 18 |
| vulnerability |
VCID-tn28-662n-vug8 |
|
| 19 |
| vulnerability |
VCID-ttq3-65ny-skdg |
|
| 20 |
| vulnerability |
VCID-vqvz-jfqh-jkaz |
|
| 21 |
| vulnerability |
VCID-zm3a-mf2z-xfcm |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:deb/debian/python-aiohttp@3.8.4-1%252Bdeb12u1 |
|
| 1 |
| url |
pkg:deb/debian/python-aiohttp@3.11.16-1 |
| purl |
pkg:deb/debian/python-aiohttp@3.11.16-1 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-19q4-vzzb-8uca |
|
| 1 |
| vulnerability |
VCID-5f1f-mrwv-zucz |
|
| 2 |
| vulnerability |
VCID-cg9h-fysf-xygf |
|
| 3 |
| vulnerability |
VCID-d3pa-kwgz-vuag |
|
| 4 |
| vulnerability |
VCID-drqp-x9gc-2qd3 |
|
| 5 |
| vulnerability |
VCID-ft9z-nd6x-27dz |
|
| 6 |
| vulnerability |
VCID-g4rj-1kzy-pkft |
|
| 7 |
| vulnerability |
VCID-hyh4-58xy-xfge |
|
| 8 |
| vulnerability |
VCID-k122-7d38-2ug5 |
|
| 9 |
| vulnerability |
VCID-kf4p-q9n9-ayhn |
|
| 10 |
| vulnerability |
VCID-peyu-fxyx-ayde |
|
| 11 |
| vulnerability |
VCID-qrus-4szm-c3bj |
|
| 12 |
| vulnerability |
VCID-qt9z-6kwe-wbht |
|
| 13 |
| vulnerability |
VCID-sjws-ddnq-fke2 |
|
| 14 |
| vulnerability |
VCID-t9gx-etxx-vkgb |
|
| 15 |
| vulnerability |
VCID-tmjw-8cdt-7yf7 |
|
| 16 |
| vulnerability |
VCID-vqvz-jfqh-jkaz |
|
| 17 |
| vulnerability |
VCID-zm3a-mf2z-xfcm |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:deb/debian/python-aiohttp@3.11.16-1 |
|
|
| aliases |
CVE-2024-27306, GHSA-7gpw-8wmc-pm8g
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-tn28-662n-vug8 |
|
| 23 |
| url |
VCID-ue33-na1g-rqa7 |
| vulnerability_id |
VCID-ue33-na1g-rqa7 |
| summary |
aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. Improper validation makes it possible for an attacker to modify the HTTP request (e.g. insert a new header) or even create a new HTTP request if the attacker controls the HTTP method. The vulnerability occurs only if the attacker can control the HTTP method (GET, POST etc.) of the request. If the attacker can control the HTTP version of the request it will be able to modify the request (request smuggling). This issue has been patched in version 3.9.0. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-49082 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00221 |
| scoring_system |
epss |
| scoring_elements |
0.44596 |
| published_at |
2026-04-29T12:55:00Z |
|
| 1 |
| value |
0.00221 |
| scoring_system |
epss |
| scoring_elements |
0.44773 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00221 |
| scoring_system |
epss |
| scoring_elements |
0.44749 |
| published_at |
2026-04-21T12:55:00Z |
|
| 3 |
| value |
0.00221 |
| scoring_system |
epss |
| scoring_elements |
0.4482 |
| published_at |
2026-04-18T12:55:00Z |
|
| 4 |
| value |
0.00221 |
| scoring_system |
epss |
| scoring_elements |
0.44826 |
| published_at |
2026-04-16T12:55:00Z |
|
| 5 |
| value |
0.00221 |
| scoring_system |
epss |
| scoring_elements |
0.44772 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.00221 |
| scoring_system |
epss |
| scoring_elements |
0.44802 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00221 |
| scoring_system |
epss |
| scoring_elements |
0.44786 |
| published_at |
2026-04-09T12:55:00Z |
|
| 8 |
| value |
0.00221 |
| scoring_system |
epss |
| scoring_elements |
0.44783 |
| published_at |
2026-04-08T12:55:00Z |
|
| 9 |
| value |
0.00221 |
| scoring_system |
epss |
| scoring_elements |
0.4473 |
| published_at |
2026-04-07T12:55:00Z |
|
| 10 |
| value |
0.00221 |
| scoring_system |
epss |
| scoring_elements |
0.44791 |
| published_at |
2026-04-04T12:55:00Z |
|
| 11 |
| value |
0.00221 |
| scoring_system |
epss |
| scoring_elements |
0.4477 |
| published_at |
2026-04-02T12:55:00Z |
|
| 12 |
| value |
0.00221 |
| scoring_system |
epss |
| scoring_elements |
0.44675 |
| published_at |
2026-04-26T12:55:00Z |
|
| 13 |
| value |
0.00221 |
| scoring_system |
epss |
| scoring_elements |
0.44668 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-49082 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
| reference_url |
https://github.com/aio-libs/aiohttp |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
5.3 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N |
|
| 1 |
| value |
6.9 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N |
|
| 2 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://github.com/aio-libs/aiohttp |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:deb/debian/python-aiohttp@3.8.4-1%2Bdeb12u1 |
| purl |
pkg:deb/debian/python-aiohttp@3.8.4-1%2Bdeb12u1 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-19q4-vzzb-8uca |
|
| 1 |
| vulnerability |
VCID-5f1f-mrwv-zucz |
|
| 2 |
| vulnerability |
VCID-cg9h-fysf-xygf |
|
| 3 |
| vulnerability |
VCID-d3pa-kwgz-vuag |
|
| 4 |
| vulnerability |
VCID-drqp-x9gc-2qd3 |
|
| 5 |
| vulnerability |
VCID-ekqy-23wg-5ugu |
|
| 6 |
| vulnerability |
VCID-ft9z-nd6x-27dz |
|
| 7 |
| vulnerability |
VCID-g4rj-1kzy-pkft |
|
| 8 |
| vulnerability |
VCID-hyh4-58xy-xfge |
|
| 9 |
| vulnerability |
VCID-jxqg-x9dh-z3hb |
|
| 10 |
| vulnerability |
VCID-k122-7d38-2ug5 |
|
| 11 |
| vulnerability |
VCID-kf4p-q9n9-ayhn |
|
| 12 |
| vulnerability |
VCID-peyu-fxyx-ayde |
|
| 13 |
| vulnerability |
VCID-qrus-4szm-c3bj |
|
| 14 |
| vulnerability |
VCID-qt9z-6kwe-wbht |
|
| 15 |
| vulnerability |
VCID-sjws-ddnq-fke2 |
|
| 16 |
| vulnerability |
VCID-t9gx-etxx-vkgb |
|
| 17 |
| vulnerability |
VCID-tmjw-8cdt-7yf7 |
|
| 18 |
| vulnerability |
VCID-tn28-662n-vug8 |
|
| 19 |
| vulnerability |
VCID-ttq3-65ny-skdg |
|
| 20 |
| vulnerability |
VCID-vqvz-jfqh-jkaz |
|
| 21 |
| vulnerability |
VCID-zm3a-mf2z-xfcm |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:deb/debian/python-aiohttp@3.8.4-1%252Bdeb12u1 |
|
|
| aliases |
CVE-2023-49082, GHSA-qvrw-v9rv-5rjx, PYSEC-2023-251
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-ue33-na1g-rqa7 |
|
| 24 |
| url |
VCID-vqvz-jfqh-jkaz |
| vulnerability_id |
VCID-vqvz-jfqh-jkaz |
| summary |
AIOHTTP vulnerable to brute-force leak of internal static file path components
### Summary
Path normalization for static files prevents path traversal, but opens up the ability for an attacker to ascertain the
existence of absolute path components.
### Impact
If an application uses `web.static()` (not recommended for production deployments), it may be possible for an attacker to ascertain the existence of path components.
------
Patch: https://github.com/aio-libs/aiohttp/commit/f2a86fd5ac0383000d1715afddfa704413f0711e |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2025-69226 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19575 |
| published_at |
2026-04-29T12:55:00Z |
|
| 1 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19611 |
| published_at |
2026-04-26T12:55:00Z |
|
| 2 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19625 |
| published_at |
2026-04-24T12:55:00Z |
|
| 3 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.1973 |
| published_at |
2026-04-21T12:55:00Z |
|
| 4 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19718 |
| published_at |
2026-04-18T12:55:00Z |
|
| 5 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19716 |
| published_at |
2026-04-16T12:55:00Z |
|
| 6 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19982 |
| published_at |
2026-04-04T12:55:00Z |
|
| 7 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.1984 |
| published_at |
2026-04-09T12:55:00Z |
|
| 8 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19788 |
| published_at |
2026-04-08T12:55:00Z |
|
| 9 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19708 |
| published_at |
2026-04-07T12:55:00Z |
|
| 10 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19741 |
| published_at |
2026-04-13T12:55:00Z |
|
| 11 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19927 |
| published_at |
2026-04-02T12:55:00Z |
|
| 12 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19798 |
| published_at |
2026-04-12T12:55:00Z |
|
| 13 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19843 |
| published_at |
2026-04-11T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2025-69226 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
|
| fixed_packages |
|
| aliases |
CVE-2025-69226, GHSA-54jq-c3m8-4m76
|
| risk_score |
2.9 |
| exploitability |
0.5 |
| weighted_severity |
5.7 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-vqvz-jfqh-jkaz |
|
| 25 |
| url |
VCID-zm3a-mf2z-xfcm |
| vulnerability_id |
VCID-zm3a-mf2z-xfcm |
| summary |
AIOHTTP Vulnerable to Cookie Parser Warning Storm
### Summary
Reading multiple invalid cookies can lead to a logging storm.
### Impact
If the ``cookies`` attribute is accessed in an application, then an attacker may be able to trigger a storm of warning-level logs using a specially crafted Cookie header.
----
Patch: https://github.com/aio-libs/aiohttp/commit/64629a0834f94e46d9881f4e99c41a137e1f3326 |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2025-69230 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02675 |
| published_at |
2026-04-29T12:55:00Z |
|
| 1 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02618 |
| published_at |
2026-04-26T12:55:00Z |
|
| 2 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02629 |
| published_at |
2026-04-24T12:55:00Z |
|
| 3 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02641 |
| published_at |
2026-04-21T12:55:00Z |
|
| 4 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02533 |
| published_at |
2026-04-18T12:55:00Z |
|
| 5 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02528 |
| published_at |
2026-04-16T12:55:00Z |
|
| 6 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02546 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02572 |
| published_at |
2026-04-09T12:55:00Z |
|
| 8 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02543 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02551 |
| published_at |
2026-04-08T12:55:00Z |
|
| 10 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02541 |
| published_at |
2026-04-13T12:55:00Z |
|
| 11 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02529 |
| published_at |
2026-04-02T12:55:00Z |
|
| 12 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02554 |
| published_at |
2026-04-11T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2025-69230 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
|
| fixed_packages |
|
| aliases |
CVE-2025-69230, GHSA-fh55-r93g-j68g
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
4.9 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-zm3a-mf2z-xfcm |
|
| 26 |
| url |
VCID-zrgm-47ph-x3g3 |
| vulnerability_id |
VCID-zrgm-47ph-x3g3 |
| summary |
aiohttp allows request smuggling due to incorrect parsing of chunk extensions
### Summary
The Python parser parses newlines in chunk extensions incorrectly which can lead to request smuggling vulnerabilities under certain conditions.
### Impact
If a pure Python version of aiohttp is installed (i.e. without the usual C extensions) or `AIOHTTP_NO_EXTENSIONS` is enabled, then an attacker may be able to execute a request smuggling attack to bypass certain firewalls or proxy protections.
-----
Patch: https://github.com/aio-libs/aiohttp/commit/259edc369075de63e6f3a4eaade058c62af0df71 |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2024-52304 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00456 |
| scoring_system |
epss |
| scoring_elements |
0.63936 |
| published_at |
2026-04-29T12:55:00Z |
|
| 1 |
| value |
0.00456 |
| scoring_system |
epss |
| scoring_elements |
0.63939 |
| published_at |
2026-04-26T12:55:00Z |
|
| 2 |
| value |
0.00456 |
| scoring_system |
epss |
| scoring_elements |
0.63927 |
| published_at |
2026-04-24T12:55:00Z |
|
| 3 |
| value |
0.00456 |
| scoring_system |
epss |
| scoring_elements |
0.63921 |
| published_at |
2026-04-18T12:55:00Z |
|
| 4 |
| value |
0.00456 |
| scoring_system |
epss |
| scoring_elements |
0.63911 |
| published_at |
2026-04-21T12:55:00Z |
|
| 5 |
| value |
0.00456 |
| scoring_system |
epss |
| scoring_elements |
0.63876 |
| published_at |
2026-04-13T12:55:00Z |
|
| 6 |
| value |
0.00456 |
| scoring_system |
epss |
| scoring_elements |
0.63909 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00456 |
| scoring_system |
epss |
| scoring_elements |
0.63923 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00456 |
| scoring_system |
epss |
| scoring_elements |
0.6391 |
| published_at |
2026-04-09T12:55:00Z |
|
| 9 |
| value |
0.00456 |
| scoring_system |
epss |
| scoring_elements |
0.63892 |
| published_at |
2026-04-08T12:55:00Z |
|
| 10 |
| value |
0.00456 |
| scoring_system |
epss |
| scoring_elements |
0.63842 |
| published_at |
2026-04-07T12:55:00Z |
|
| 11 |
| value |
0.00456 |
| scoring_system |
epss |
| scoring_elements |
0.63858 |
| published_at |
2026-04-02T12:55:00Z |
|
| 12 |
| value |
0.00456 |
| scoring_system |
epss |
| scoring_elements |
0.63885 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2024-52304 |
|
| 2 |
|
| 3 |
|
| 4 |
| reference_url |
https://github.com/aio-libs/aiohttp |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
6.3 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X |
|
| 1 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://github.com/aio-libs/aiohttp |
|
| 5 |
|
| 6 |
| reference_url |
https://github.com/aio-libs/aiohttp/security/advisories/GHSA-8495-4g3g-x7pr |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
MODERATE |
| scoring_system |
cvssv3.1_qr |
| scoring_elements |
|
|
| 1 |
| value |
6.3 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N |
|
| 2 |
| value |
6.3 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X |
|
| 3 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
| 4 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-19T15:38:44Z/ |
|
|
| url |
https://github.com/aio-libs/aiohttp/security/advisories/GHSA-8495-4g3g-x7pr |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:deb/debian/python-aiohttp@3.8.4-1%2Bdeb12u1 |
| purl |
pkg:deb/debian/python-aiohttp@3.8.4-1%2Bdeb12u1 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-19q4-vzzb-8uca |
|
| 1 |
| vulnerability |
VCID-5f1f-mrwv-zucz |
|
| 2 |
| vulnerability |
VCID-cg9h-fysf-xygf |
|
| 3 |
| vulnerability |
VCID-d3pa-kwgz-vuag |
|
| 4 |
| vulnerability |
VCID-drqp-x9gc-2qd3 |
|
| 5 |
| vulnerability |
VCID-ekqy-23wg-5ugu |
|
| 6 |
| vulnerability |
VCID-ft9z-nd6x-27dz |
|
| 7 |
| vulnerability |
VCID-g4rj-1kzy-pkft |
|
| 8 |
| vulnerability |
VCID-hyh4-58xy-xfge |
|
| 9 |
| vulnerability |
VCID-jxqg-x9dh-z3hb |
|
| 10 |
| vulnerability |
VCID-k122-7d38-2ug5 |
|
| 11 |
| vulnerability |
VCID-kf4p-q9n9-ayhn |
|
| 12 |
| vulnerability |
VCID-peyu-fxyx-ayde |
|
| 13 |
| vulnerability |
VCID-qrus-4szm-c3bj |
|
| 14 |
| vulnerability |
VCID-qt9z-6kwe-wbht |
|
| 15 |
| vulnerability |
VCID-sjws-ddnq-fke2 |
|
| 16 |
| vulnerability |
VCID-t9gx-etxx-vkgb |
|
| 17 |
| vulnerability |
VCID-tmjw-8cdt-7yf7 |
|
| 18 |
| vulnerability |
VCID-tn28-662n-vug8 |
|
| 19 |
| vulnerability |
VCID-ttq3-65ny-skdg |
|
| 20 |
| vulnerability |
VCID-vqvz-jfqh-jkaz |
|
| 21 |
| vulnerability |
VCID-zm3a-mf2z-xfcm |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:deb/debian/python-aiohttp@3.8.4-1%252Bdeb12u1 |
|
|
| aliases |
CVE-2024-52304, GHSA-8495-4g3g-x7pr
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-zrgm-47ph-x3g3 |
|