Search for packages
| purl | pkg:deb/debian/python-tornado@6.2.0-3%2Bdeb12u4 |
| Vulnerability | Summary | Fixed by |
|---|---|---|
| This package is not known to be affected by vulnerabilities. | ||
| Vulnerability | Summary | Aliases |
|---|---|---|
| VCID-27x3-ch78-8ueh | tornado: Tornado Quadratic DoS via Repeated Header Coalescing |
CVE-2025-67725
|
| VCID-be89-uuxa-fyb5 | Tornado is vulnerable to DoS due to too many multipart parts In versions of Tornado prior to 6.5.5, the only limit on the number of parts in `multipart/form-data` is the `max_body_size` setting (default 100MB). Since parsing occurs synchronously on the main thread, this creates the possibility of denial-of-service due to the cost of parsing very large multipart bodies with many parts. Tornado 6.5.5 introduces new limits on the size and complexity of multipart bodies, including a default limit of 100 parts per request. These limits are configurable if needed; see `tornado.httputil.ParseMultipartConfig`. It is also now possible to disable `multipart/form-data` parsing entirely if it is not required for the application. |
CVE-2026-31958
GHSA-qjxf-f2mg-c6mc |
| VCID-g13r-ansu-27av | tornado: Tornado Header Injection and XSS via reason argument |
CVE-2025-67724
|
| VCID-nq24-395d-wuar |
CVE-2026-35536
GHSA-fqwm-6jpj-5wxc |
|
| VCID-y1z8-z2f1-mqg7 | tornado: Tornado Quadratic DoS via Crafted Multipart Parameters |
CVE-2025-67726
|