| 0 |
| url |
VCID-19q4-vzzb-8uca |
| vulnerability_id |
VCID-19q4-vzzb-8uca |
| summary |
|
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2026-34519 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00039 |
| scoring_system |
epss |
| scoring_elements |
0.11693 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.00039 |
| scoring_system |
epss |
| scoring_elements |
0.1165 |
| published_at |
2026-04-29T12:55:00Z |
|
| 2 |
| value |
0.00039 |
| scoring_system |
epss |
| scoring_elements |
0.11778 |
| published_at |
2026-04-24T12:55:00Z |
|
| 3 |
| value |
0.00039 |
| scoring_system |
epss |
| scoring_elements |
0.1181 |
| published_at |
2026-04-21T12:55:00Z |
|
| 4 |
| value |
0.00039 |
| scoring_system |
epss |
| scoring_elements |
0.11732 |
| published_at |
2026-04-26T12:55:00Z |
|
| 5 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.13732 |
| published_at |
2026-04-02T12:55:00Z |
|
| 6 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.13791 |
| published_at |
2026-04-04T12:55:00Z |
|
| 7 |
| value |
0.00059 |
| scoring_system |
epss |
| scoring_elements |
0.18287 |
| published_at |
2026-04-07T12:55:00Z |
|
| 8 |
| value |
0.00059 |
| scoring_system |
epss |
| scoring_elements |
0.18268 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00059 |
| scoring_system |
epss |
| scoring_elements |
0.18323 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00059 |
| scoring_system |
epss |
| scoring_elements |
0.18375 |
| published_at |
2026-04-12T12:55:00Z |
|
| 11 |
| value |
0.00059 |
| scoring_system |
epss |
| scoring_elements |
0.18422 |
| published_at |
2026-04-11T12:55:00Z |
|
| 12 |
| value |
0.00059 |
| scoring_system |
epss |
| scoring_elements |
0.18423 |
| published_at |
2026-04-09T12:55:00Z |
|
| 13 |
| value |
0.00059 |
| scoring_system |
epss |
| scoring_elements |
0.1837 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2026-34519 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
|
| fixed_packages |
|
| aliases |
CVE-2026-34519, GHSA-mwh4-6h8g-pg8w
|
| risk_score |
2.4 |
| exploitability |
0.5 |
| weighted_severity |
4.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-19q4-vzzb-8uca |
|
| 1 |
| url |
VCID-5f1f-mrwv-zucz |
| vulnerability_id |
VCID-5f1f-mrwv-zucz |
| summary |
|
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2026-34513 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0004 |
| scoring_system |
epss |
| scoring_elements |
0.122 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.0004 |
| scoring_system |
epss |
| scoring_elements |
0.12245 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16263 |
| published_at |
2026-04-24T12:55:00Z |
|
| 3 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16369 |
| published_at |
2026-04-21T12:55:00Z |
|
| 4 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16335 |
| published_at |
2026-04-18T12:55:00Z |
|
| 5 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16315 |
| published_at |
2026-04-16T12:55:00Z |
|
| 6 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16386 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16441 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16218 |
| published_at |
2026-04-29T12:55:00Z |
|
| 9 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16259 |
| published_at |
2026-04-26T12:55:00Z |
|
| 10 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16485 |
| published_at |
2026-04-11T12:55:00Z |
|
| 11 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16355 |
| published_at |
2026-04-07T12:55:00Z |
|
| 12 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.165 |
| published_at |
2026-04-09T12:55:00Z |
|
| 13 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16446 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2026-34513 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
|
| fixed_packages |
|
| aliases |
CVE-2026-34513, GHSA-hcc4-c3v8-rx92
|
| risk_score |
1.6 |
| exploitability |
0.5 |
| weighted_severity |
3.3 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-5f1f-mrwv-zucz |
|
| 2 |
| url |
VCID-cg9h-fysf-xygf |
| vulnerability_id |
VCID-cg9h-fysf-xygf |
| summary |
|
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2026-34516 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00038 |
| scoring_system |
epss |
| scoring_elements |
0.11462 |
| published_at |
2026-04-04T12:55:00Z |
|
| 1 |
| value |
0.0004 |
| scoring_system |
epss |
| scoring_elements |
0.122 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.0005 |
| scoring_system |
epss |
| scoring_elements |
0.1533 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.0005 |
| scoring_system |
epss |
| scoring_elements |
0.15325 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.0005 |
| scoring_system |
epss |
| scoring_elements |
0.15391 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.0005 |
| scoring_system |
epss |
| scoring_elements |
0.1543 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.0005 |
| scoring_system |
epss |
| scoring_elements |
0.15468 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.0005 |
| scoring_system |
epss |
| scoring_elements |
0.15418 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16335 |
| published_at |
2026-04-18T12:55:00Z |
|
| 9 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16259 |
| published_at |
2026-04-26T12:55:00Z |
|
| 10 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16263 |
| published_at |
2026-04-24T12:55:00Z |
|
| 11 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16369 |
| published_at |
2026-04-21T12:55:00Z |
|
| 12 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16315 |
| published_at |
2026-04-16T12:55:00Z |
|
| 13 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16218 |
| published_at |
2026-04-29T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2026-34516 |
|
| 2 |
|
| 3 |
|
| 4 |
| reference_url |
https://github.com/aio-libs/aiohttp |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
7.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
|
| 1 |
| value |
6.6 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U |
|
| 2 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://github.com/aio-libs/aiohttp |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
|
| fixed_packages |
|
| aliases |
CVE-2026-34516, GHSA-m5qp-6w8w-w647
|
| risk_score |
3.4 |
| exploitability |
0.5 |
| weighted_severity |
6.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-cg9h-fysf-xygf |
|
| 3 |
| url |
VCID-d3pa-kwgz-vuag |
| vulnerability_id |
VCID-d3pa-kwgz-vuag |
| summary |
AIOHTTP vulnerable to denial of service through large payloads
### Summary
A request can be crafted in such a way that an aiohttp server's memory fills up uncontrollably during processing.
### Impact
If an application includes a handler that uses the `Request.post()` method, an attacker may be able to freeze the server by exhausting the memory.
-----
Patch: https://github.com/aio-libs/aiohttp/commit/b7dbd35375aedbcd712cbae8ad513d56d11cce60 |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2025-69228 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.1943 |
| published_at |
2026-04-29T12:55:00Z |
|
| 1 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19467 |
| published_at |
2026-04-26T12:55:00Z |
|
| 2 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19479 |
| published_at |
2026-04-24T12:55:00Z |
|
| 3 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19584 |
| published_at |
2026-04-21T12:55:00Z |
|
| 4 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19572 |
| published_at |
2026-04-18T12:55:00Z |
|
| 5 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19565 |
| published_at |
2026-04-16T12:55:00Z |
|
| 6 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19637 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19835 |
| published_at |
2026-04-04T12:55:00Z |
|
| 8 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19557 |
| published_at |
2026-04-07T12:55:00Z |
|
| 9 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19689 |
| published_at |
2026-04-09T12:55:00Z |
|
| 10 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19587 |
| published_at |
2026-04-13T12:55:00Z |
|
| 11 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19782 |
| published_at |
2026-04-02T12:55:00Z |
|
| 12 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19646 |
| published_at |
2026-04-12T12:55:00Z |
|
| 13 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19695 |
| published_at |
2026-04-11T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2025-69228 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
|
| fixed_packages |
|
| aliases |
CVE-2025-69228, GHSA-6jhg-hg63-jvvf
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-d3pa-kwgz-vuag |
|
| 4 |
| url |
VCID-drqp-x9gc-2qd3 |
| vulnerability_id |
VCID-drqp-x9gc-2qd3 |
| summary |
|
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2026-34518 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00038 |
| scoring_system |
epss |
| scoring_elements |
0.11175 |
| published_at |
2026-04-29T12:55:00Z |
|
| 1 |
| value |
0.00038 |
| scoring_system |
epss |
| scoring_elements |
0.11236 |
| published_at |
2026-04-26T12:55:00Z |
|
| 2 |
| value |
0.00038 |
| scoring_system |
epss |
| scoring_elements |
0.11208 |
| published_at |
2026-04-18T12:55:00Z |
|
| 3 |
| value |
0.00038 |
| scoring_system |
epss |
| scoring_elements |
0.11277 |
| published_at |
2026-04-24T12:55:00Z |
|
| 4 |
| value |
0.00038 |
| scoring_system |
epss |
| scoring_elements |
0.11337 |
| published_at |
2026-04-21T12:55:00Z |
|
| 5 |
| value |
0.0004 |
| scoring_system |
epss |
| scoring_elements |
0.122 |
| published_at |
2026-04-02T12:55:00Z |
|
| 6 |
| value |
0.0004 |
| scoring_system |
epss |
| scoring_elements |
0.12245 |
| published_at |
2026-04-04T12:55:00Z |
|
| 7 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16355 |
| published_at |
2026-04-07T12:55:00Z |
|
| 8 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16325 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16386 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16446 |
| published_at |
2026-04-12T12:55:00Z |
|
| 11 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16485 |
| published_at |
2026-04-11T12:55:00Z |
|
| 12 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.165 |
| published_at |
2026-04-09T12:55:00Z |
|
| 13 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16441 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2026-34518 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
|
| fixed_packages |
|
| aliases |
CVE-2026-34518, GHSA-966j-vmvw-g2g9
|
| risk_score |
1.6 |
| exploitability |
0.5 |
| weighted_severity |
3.3 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-drqp-x9gc-2qd3 |
|
| 5 |
| url |
VCID-ft9z-nd6x-27dz |
| vulnerability_id |
VCID-ft9z-nd6x-27dz |
| summary |
AIOHTTP has unicode match groups in regexes for ASCII protocol elements
### Summary
The parser allows non-ASCII decimals to be present in the Range header.
### Impact
There is no known impact, but there is the possibility that there's a method to exploit a request smuggling vulnerability.
----
Patch: https://github.com/aio-libs/aiohttp/commit/c7b7a044f88c71cefda95ec75cdcfaa4792b3b96 |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2025-69225 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.13843 |
| published_at |
2026-04-29T12:55:00Z |
|
| 1 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.1391 |
| published_at |
2026-04-26T12:55:00Z |
|
| 2 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.13936 |
| published_at |
2026-04-24T12:55:00Z |
|
| 3 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.13935 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.14126 |
| published_at |
2026-04-04T12:55:00Z |
|
| 5 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.13932 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.14014 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.14067 |
| published_at |
2026-04-09T12:55:00Z |
|
| 8 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.14022 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.13985 |
| published_at |
2026-04-12T12:55:00Z |
|
| 10 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.13905 |
| published_at |
2026-04-21T12:55:00Z |
|
| 11 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.14072 |
| published_at |
2026-04-02T12:55:00Z |
|
| 12 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.13833 |
| published_at |
2026-04-18T12:55:00Z |
|
| 13 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.13839 |
| published_at |
2026-04-16T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2025-69225 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
|
| fixed_packages |
|
| aliases |
CVE-2025-69225, GHSA-mqqc-3gqh-h2x8
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
4.9 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-ft9z-nd6x-27dz |
|
| 6 |
| url |
VCID-g4rj-1kzy-pkft |
| vulnerability_id |
VCID-g4rj-1kzy-pkft |
| summary |
|
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2026-34525 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00085 |
| scoring_system |
epss |
| scoring_elements |
0.24814 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00085 |
| scoring_system |
epss |
| scoring_elements |
0.24852 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.001 |
| scoring_system |
epss |
| scoring_elements |
0.27783 |
| published_at |
2026-04-12T12:55:00Z |
|
| 3 |
| value |
0.001 |
| scoring_system |
epss |
| scoring_elements |
0.27825 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.001 |
| scoring_system |
epss |
| scoring_elements |
0.2782 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.001 |
| scoring_system |
epss |
| scoring_elements |
0.27777 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.001 |
| scoring_system |
epss |
| scoring_elements |
0.27709 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.001 |
| scoring_system |
epss |
| scoring_elements |
0.27734 |
| published_at |
2026-04-16T12:55:00Z |
|
| 8 |
| value |
0.001 |
| scoring_system |
epss |
| scoring_elements |
0.27726 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00119 |
| scoring_system |
epss |
| scoring_elements |
0.30498 |
| published_at |
2026-04-29T12:55:00Z |
|
| 10 |
| value |
0.00119 |
| scoring_system |
epss |
| scoring_elements |
0.30894 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00119 |
| scoring_system |
epss |
| scoring_elements |
0.3086 |
| published_at |
2026-04-21T12:55:00Z |
|
| 12 |
| value |
0.00119 |
| scoring_system |
epss |
| scoring_elements |
0.30698 |
| published_at |
2026-04-24T12:55:00Z |
|
| 13 |
| value |
0.00119 |
| scoring_system |
epss |
| scoring_elements |
0.30582 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2026-34525 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
|
| fixed_packages |
|
| aliases |
CVE-2026-34525, GHSA-c427-h43c-vf67
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-g4rj-1kzy-pkft |
|
| 7 |
| url |
VCID-hyh4-58xy-xfge |
| vulnerability_id |
VCID-hyh4-58xy-xfge |
| summary |
|
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2026-34517 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0004 |
| scoring_system |
epss |
| scoring_elements |
0.12245 |
| published_at |
2026-04-04T12:55:00Z |
|
| 1 |
| value |
0.0004 |
| scoring_system |
epss |
| scoring_elements |
0.122 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00051 |
| scoring_system |
epss |
| scoring_elements |
0.15771 |
| published_at |
2026-04-29T12:55:00Z |
|
| 3 |
| value |
0.00051 |
| scoring_system |
epss |
| scoring_elements |
0.15744 |
| published_at |
2026-04-16T12:55:00Z |
|
| 4 |
| value |
0.00051 |
| scoring_system |
epss |
| scoring_elements |
0.15753 |
| published_at |
2026-04-18T12:55:00Z |
|
| 5 |
| value |
0.00051 |
| scoring_system |
epss |
| scoring_elements |
0.15796 |
| published_at |
2026-04-21T12:55:00Z |
|
| 6 |
| value |
0.00051 |
| scoring_system |
epss |
| scoring_elements |
0.15817 |
| published_at |
2026-04-24T12:55:00Z |
|
| 7 |
| value |
0.00051 |
| scoring_system |
epss |
| scoring_elements |
0.15814 |
| published_at |
2026-04-26T12:55:00Z |
|
| 8 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16485 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16446 |
| published_at |
2026-04-12T12:55:00Z |
|
| 10 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16355 |
| published_at |
2026-04-07T12:55:00Z |
|
| 11 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16441 |
| published_at |
2026-04-08T12:55:00Z |
|
| 12 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.165 |
| published_at |
2026-04-09T12:55:00Z |
|
| 13 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16386 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2026-34517 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
|
| fixed_packages |
|
| aliases |
CVE-2026-34517, GHSA-3wq7-rqq7-wx6j
|
| risk_score |
1.6 |
| exploitability |
0.5 |
| weighted_severity |
3.3 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-hyh4-58xy-xfge |
|
| 8 |
| url |
VCID-k122-7d38-2ug5 |
| vulnerability_id |
VCID-k122-7d38-2ug5 |
| summary |
AIOHTTP is vulnerable to HTTP Request/Response Smuggling through incorrect parsing of chunked trailer sections
### Summary
The Python parser is vulnerable to a request smuggling vulnerability due to not parsing trailer sections of an HTTP request.
### Impact
If a pure Python version of aiohttp is installed (i.e. without the usual C extensions) or AIOHTTP_NO_EXTENSIONS is enabled, then an attacker may be able to execute a request smuggling attack to bypass certain firewalls or proxy protections.
----
Patch: https://github.com/aio-libs/aiohttp/commit/e8d774f635dc6d1cd3174d0e38891da5de0e2b6a |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2025-53643 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00078 |
| scoring_system |
epss |
| scoring_elements |
0.23245 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00078 |
| scoring_system |
epss |
| scoring_elements |
0.23152 |
| published_at |
2026-04-08T12:55:00Z |
|
| 2 |
| value |
0.00078 |
| scoring_system |
epss |
| scoring_elements |
0.23289 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00078 |
| scoring_system |
epss |
| scoring_elements |
0.23078 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00086 |
| scoring_system |
epss |
| scoring_elements |
0.24852 |
| published_at |
2026-04-18T12:55:00Z |
|
| 5 |
| value |
0.00086 |
| scoring_system |
epss |
| scoring_elements |
0.24858 |
| published_at |
2026-04-16T12:55:00Z |
|
| 6 |
| value |
0.00086 |
| scoring_system |
epss |
| scoring_elements |
0.24847 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.00086 |
| scoring_system |
epss |
| scoring_elements |
0.24901 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00086 |
| scoring_system |
epss |
| scoring_elements |
0.2494 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
0.00086 |
| scoring_system |
epss |
| scoring_elements |
0.24925 |
| published_at |
2026-04-09T12:55:00Z |
|
| 10 |
| value |
0.00086 |
| scoring_system |
epss |
| scoring_elements |
0.24716 |
| published_at |
2026-04-29T12:55:00Z |
|
| 11 |
| value |
0.00086 |
| scoring_system |
epss |
| scoring_elements |
0.24762 |
| published_at |
2026-04-26T12:55:00Z |
|
| 12 |
| value |
0.00086 |
| scoring_system |
epss |
| scoring_elements |
0.24773 |
| published_at |
2026-04-24T12:55:00Z |
|
| 13 |
| value |
0.00086 |
| scoring_system |
epss |
| scoring_elements |
0.2483 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2025-53643 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
|
| fixed_packages |
|
| aliases |
CVE-2025-53643, GHSA-9548-qrrj-x5pj
|
| risk_score |
1.6 |
| exploitability |
0.5 |
| weighted_severity |
3.3 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-k122-7d38-2ug5 |
|
| 9 |
| url |
VCID-kf4p-q9n9-ayhn |
| vulnerability_id |
VCID-kf4p-q9n9-ayhn |
| summary |
|
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2026-22815 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00038 |
| scoring_system |
epss |
| scoring_elements |
0.11462 |
| published_at |
2026-04-04T12:55:00Z |
|
| 1 |
| value |
0.0004 |
| scoring_system |
epss |
| scoring_elements |
0.122 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16263 |
| published_at |
2026-04-24T12:55:00Z |
|
| 3 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16369 |
| published_at |
2026-04-21T12:55:00Z |
|
| 4 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16335 |
| published_at |
2026-04-18T12:55:00Z |
|
| 5 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16315 |
| published_at |
2026-04-16T12:55:00Z |
|
| 6 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16346 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16218 |
| published_at |
2026-04-29T12:55:00Z |
|
| 8 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16259 |
| published_at |
2026-04-26T12:55:00Z |
|
| 9 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16475 |
| published_at |
2026-04-11T12:55:00Z |
|
| 10 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16491 |
| published_at |
2026-04-09T12:55:00Z |
|
| 11 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16432 |
| published_at |
2026-04-08T12:55:00Z |
|
| 12 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16375 |
| published_at |
2026-04-13T12:55:00Z |
|
| 13 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16436 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2026-22815 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
|
| fixed_packages |
|
| aliases |
CVE-2026-22815, GHSA-w2fm-2cpv-w7v5
|
| risk_score |
3.4 |
| exploitability |
0.5 |
| weighted_severity |
6.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-kf4p-q9n9-ayhn |
|
| 10 |
| url |
VCID-peyu-fxyx-ayde |
| vulnerability_id |
VCID-peyu-fxyx-ayde |
| summary |
AIOHTTP vulnerable to DoS through chunked messages
### Summary
Handling of chunked messages can result in excessive blocking CPU usage when receiving a large number of chunks.
### Impact
If an application makes use of the `request.read()` method in an endpoint, it may be possible for an attacker to cause the server to spend a moderate amount of blocking CPU time (e.g. 1 second) while processing the request. This could potentially lead to DoS as the server would be unable to handle other requests during that time.
-----
Patch: https://github.com/aio-libs/aiohttp/commit/dc3170b56904bdf814228fae70a5501a42a6c712
Patch: https://github.com/aio-libs/aiohttp/commit/4ed97a4e46eaf61bd0f05063245f613469700229 |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2025-69229 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16113 |
| published_at |
2026-04-29T12:55:00Z |
|
| 1 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16152 |
| published_at |
2026-04-26T12:55:00Z |
|
| 2 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16154 |
| published_at |
2026-04-24T12:55:00Z |
|
| 3 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16261 |
| published_at |
2026-04-21T12:55:00Z |
|
| 4 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16223 |
| published_at |
2026-04-18T12:55:00Z |
|
| 5 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16204 |
| published_at |
2026-04-16T12:55:00Z |
|
| 6 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16268 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16336 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16243 |
| published_at |
2026-04-07T12:55:00Z |
|
| 9 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16392 |
| published_at |
2026-04-09T12:55:00Z |
|
| 10 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16328 |
| published_at |
2026-04-08T12:55:00Z |
|
| 11 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16454 |
| published_at |
2026-04-04T12:55:00Z |
|
| 12 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16375 |
| published_at |
2026-04-11T12:55:00Z |
|
| 13 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16391 |
| published_at |
2026-04-02T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2025-69229 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
|
| fixed_packages |
|
| aliases |
CVE-2025-69229, GHSA-g84x-mcqj-x9qq
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-peyu-fxyx-ayde |
|
| 11 |
| url |
VCID-qrus-4szm-c3bj |
| vulnerability_id |
VCID-qrus-4szm-c3bj |
| summary |
AIOHTTP's unicode processing of header values could cause parsing discrepancies
### Summary
The Python HTTP parser may allow a request smuggling attack with the presence of non-ASCII characters.
### Impact
If a pure Python version of aiohttp is installed (i.e. without the usual C extensions) or AIOHTTP_NO_EXTENSIONS is enabled, then an attacker may be able to execute a request smuggling attack to bypass certain firewalls or proxy protections.
------
Patch: https://github.com/aio-libs/aiohttp/commit/32677f2adfd907420c078dda6b79225c6f4ebce0 |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2025-69224 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00043 |
| scoring_system |
epss |
| scoring_elements |
0.13124 |
| published_at |
2026-04-29T12:55:00Z |
|
| 1 |
| value |
0.00043 |
| scoring_system |
epss |
| scoring_elements |
0.13228 |
| published_at |
2026-04-26T12:55:00Z |
|
| 2 |
| value |
0.00043 |
| scoring_system |
epss |
| scoring_elements |
0.13256 |
| published_at |
2026-04-24T12:55:00Z |
|
| 3 |
| value |
0.00043 |
| scoring_system |
epss |
| scoring_elements |
0.13251 |
| published_at |
2026-04-21T12:55:00Z |
|
| 4 |
| value |
0.00043 |
| scoring_system |
epss |
| scoring_elements |
0.13164 |
| published_at |
2026-04-18T12:55:00Z |
|
| 5 |
| value |
0.00043 |
| scoring_system |
epss |
| scoring_elements |
0.13165 |
| published_at |
2026-04-16T12:55:00Z |
|
| 6 |
| value |
0.00043 |
| scoring_system |
epss |
| scoring_elements |
0.13259 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.00043 |
| scoring_system |
epss |
| scoring_elements |
0.13308 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00043 |
| scoring_system |
epss |
| scoring_elements |
0.13243 |
| published_at |
2026-04-07T12:55:00Z |
|
| 9 |
| value |
0.00043 |
| scoring_system |
epss |
| scoring_elements |
0.13325 |
| published_at |
2026-04-08T12:55:00Z |
|
| 10 |
| value |
0.00043 |
| scoring_system |
epss |
| scoring_elements |
0.13447 |
| published_at |
2026-04-04T12:55:00Z |
|
| 11 |
| value |
0.00043 |
| scoring_system |
epss |
| scoring_elements |
0.13383 |
| published_at |
2026-04-02T12:55:00Z |
|
| 12 |
| value |
0.00043 |
| scoring_system |
epss |
| scoring_elements |
0.13346 |
| published_at |
2026-04-11T12:55:00Z |
|
| 13 |
| value |
0.00043 |
| scoring_system |
epss |
| scoring_elements |
0.13376 |
| published_at |
2026-04-09T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2025-69224 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
|
| fixed_packages |
|
| aliases |
CVE-2025-69224, GHSA-69f9-5gxw-wvc2
|
| risk_score |
2.9 |
| exploitability |
0.5 |
| weighted_severity |
5.7 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-qrus-4szm-c3bj |
|
| 12 |
| url |
VCID-qt9z-6kwe-wbht |
| vulnerability_id |
VCID-qt9z-6kwe-wbht |
| summary |
|
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2026-34514 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00039 |
| scoring_system |
epss |
| scoring_elements |
0.1165 |
| published_at |
2026-04-29T12:55:00Z |
|
| 1 |
| value |
0.00039 |
| scoring_system |
epss |
| scoring_elements |
0.11693 |
| published_at |
2026-04-18T12:55:00Z |
|
| 2 |
| value |
0.00039 |
| scoring_system |
epss |
| scoring_elements |
0.11694 |
| published_at |
2026-04-16T12:55:00Z |
|
| 3 |
| value |
0.00039 |
| scoring_system |
epss |
| scoring_elements |
0.11732 |
| published_at |
2026-04-26T12:55:00Z |
|
| 4 |
| value |
0.00039 |
| scoring_system |
epss |
| scoring_elements |
0.11778 |
| published_at |
2026-04-24T12:55:00Z |
|
| 5 |
| value |
0.00039 |
| scoring_system |
epss |
| scoring_elements |
0.1181 |
| published_at |
2026-04-21T12:55:00Z |
|
| 6 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.13732 |
| published_at |
2026-04-02T12:55:00Z |
|
| 7 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.13791 |
| published_at |
2026-04-04T12:55:00Z |
|
| 8 |
| value |
0.00059 |
| scoring_system |
epss |
| scoring_elements |
0.18323 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00059 |
| scoring_system |
epss |
| scoring_elements |
0.18287 |
| published_at |
2026-04-07T12:55:00Z |
|
| 10 |
| value |
0.00059 |
| scoring_system |
epss |
| scoring_elements |
0.18375 |
| published_at |
2026-04-12T12:55:00Z |
|
| 11 |
| value |
0.00059 |
| scoring_system |
epss |
| scoring_elements |
0.18423 |
| published_at |
2026-04-09T12:55:00Z |
|
| 12 |
| value |
0.00059 |
| scoring_system |
epss |
| scoring_elements |
0.1837 |
| published_at |
2026-04-08T12:55:00Z |
|
| 13 |
| value |
0.00059 |
| scoring_system |
epss |
| scoring_elements |
0.18422 |
| published_at |
2026-04-11T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2026-34514 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
|
| fixed_packages |
|
| aliases |
CVE-2026-34514, GHSA-2vrm-gr82-f7m5
|
| risk_score |
2.4 |
| exploitability |
0.5 |
| weighted_severity |
4.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-qt9z-6kwe-wbht |
|
| 13 |
| url |
VCID-sjws-ddnq-fke2 |
| vulnerability_id |
VCID-sjws-ddnq-fke2 |
| summary |
AIOHTTP's HTTP Parser auto_decompress feature is vulnerable to zip bomb
### Summary
A zip bomb can be used to execute a DoS against the aiohttp server.
### Impact
An attacker may be able to send a compressed request that when decompressed by aiohttp could exhaust the host's memory.
------
Patch: https://github.com/aio-libs/aiohttp/commit/2b920c39002cee0ec5b402581779bbaaf7c9138a |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2025-69223 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.1943 |
| published_at |
2026-04-29T12:55:00Z |
|
| 1 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19467 |
| published_at |
2026-04-26T12:55:00Z |
|
| 2 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19479 |
| published_at |
2026-04-24T12:55:00Z |
|
| 3 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19584 |
| published_at |
2026-04-21T12:55:00Z |
|
| 4 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19572 |
| published_at |
2026-04-18T12:55:00Z |
|
| 5 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19565 |
| published_at |
2026-04-16T12:55:00Z |
|
| 6 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19637 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19835 |
| published_at |
2026-04-04T12:55:00Z |
|
| 8 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19557 |
| published_at |
2026-04-07T12:55:00Z |
|
| 9 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19689 |
| published_at |
2026-04-09T12:55:00Z |
|
| 10 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19587 |
| published_at |
2026-04-13T12:55:00Z |
|
| 11 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19782 |
| published_at |
2026-04-02T12:55:00Z |
|
| 12 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19646 |
| published_at |
2026-04-12T12:55:00Z |
|
| 13 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19695 |
| published_at |
2026-04-11T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2025-69223 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
|
| fixed_packages |
|
| aliases |
CVE-2025-69223, GHSA-6mq8-rvhq-8wgg
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-sjws-ddnq-fke2 |
|
| 14 |
| url |
VCID-t9gx-etxx-vkgb |
| vulnerability_id |
VCID-t9gx-etxx-vkgb |
| summary |
AIOHTTP vulnerable to DoS when bypassing asserts
### Summary
When assert statements are bypassed, an infinite loop can occur, resulting in a DoS attack when processing a POST body.
### Impact
If optimisations are enabled (`-O` or `PYTHONOPTIMIZE=1`), and the application includes a handler that uses the `Request.post()` method, then an attacker may be able to execute a DoS attack with a specially crafted message.
------
Patch: https://github.com/aio-libs/aiohttp/commit/bc1319ec3cbff9438a758951a30907b072561259 |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2025-69227 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.1943 |
| published_at |
2026-04-29T12:55:00Z |
|
| 1 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19467 |
| published_at |
2026-04-26T12:55:00Z |
|
| 2 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19479 |
| published_at |
2026-04-24T12:55:00Z |
|
| 3 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19584 |
| published_at |
2026-04-21T12:55:00Z |
|
| 4 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19572 |
| published_at |
2026-04-18T12:55:00Z |
|
| 5 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19565 |
| published_at |
2026-04-16T12:55:00Z |
|
| 6 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19637 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19835 |
| published_at |
2026-04-04T12:55:00Z |
|
| 8 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19557 |
| published_at |
2026-04-07T12:55:00Z |
|
| 9 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19689 |
| published_at |
2026-04-09T12:55:00Z |
|
| 10 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19587 |
| published_at |
2026-04-13T12:55:00Z |
|
| 11 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19782 |
| published_at |
2026-04-02T12:55:00Z |
|
| 12 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19646 |
| published_at |
2026-04-12T12:55:00Z |
|
| 13 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19695 |
| published_at |
2026-04-11T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2025-69227 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
|
| fixed_packages |
|
| aliases |
CVE-2025-69227, GHSA-jj3x-wxrx-4x23
|
| risk_score |
3.4 |
| exploitability |
0.5 |
| weighted_severity |
6.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-t9gx-etxx-vkgb |
|
| 15 |
| url |
VCID-tmjw-8cdt-7yf7 |
| vulnerability_id |
VCID-tmjw-8cdt-7yf7 |
| summary |
|
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2026-34520 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00042 |
| scoring_system |
epss |
| scoring_elements |
0.13027 |
| published_at |
2026-04-04T12:55:00Z |
|
| 1 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.13732 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00055 |
| scoring_system |
epss |
| scoring_elements |
0.17325 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00055 |
| scoring_system |
epss |
| scoring_elements |
0.17329 |
| published_at |
2026-04-16T12:55:00Z |
|
| 4 |
| value |
0.00055 |
| scoring_system |
epss |
| scoring_elements |
0.17387 |
| published_at |
2026-04-13T12:55:00Z |
|
| 5 |
| value |
0.00055 |
| scoring_system |
epss |
| scoring_elements |
0.17441 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.00055 |
| scoring_system |
epss |
| scoring_elements |
0.17488 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00055 |
| scoring_system |
epss |
| scoring_elements |
0.17476 |
| published_at |
2026-04-09T12:55:00Z |
|
| 8 |
| value |
0.00055 |
| scoring_system |
epss |
| scoring_elements |
0.17416 |
| published_at |
2026-04-08T12:55:00Z |
|
| 9 |
| value |
0.00057 |
| scoring_system |
epss |
| scoring_elements |
0.17799 |
| published_at |
2026-04-29T12:55:00Z |
|
| 10 |
| value |
0.00057 |
| scoring_system |
epss |
| scoring_elements |
0.17948 |
| published_at |
2026-04-21T12:55:00Z |
|
| 11 |
| value |
0.00057 |
| scoring_system |
epss |
| scoring_elements |
0.17912 |
| published_at |
2026-04-18T12:55:00Z |
|
| 12 |
| value |
0.00057 |
| scoring_system |
epss |
| scoring_elements |
0.17836 |
| published_at |
2026-04-26T12:55:00Z |
|
| 13 |
| value |
0.00057 |
| scoring_system |
epss |
| scoring_elements |
0.17858 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2026-34520 |
|
| 2 |
|
| 3 |
|
| 4 |
| reference_url |
https://github.com/aio-libs/aiohttp |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
9.1 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H |
|
| 1 |
| value |
2.7 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:U |
|
| 2 |
| value |
LOW |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://github.com/aio-libs/aiohttp |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
|
| fixed_packages |
|
| aliases |
CVE-2026-34520, GHSA-63hf-3vf5-4wqf
|
| risk_score |
4.1 |
| exploitability |
0.5 |
| weighted_severity |
8.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-tmjw-8cdt-7yf7 |
|
| 16 |
| url |
VCID-vqvz-jfqh-jkaz |
| vulnerability_id |
VCID-vqvz-jfqh-jkaz |
| summary |
AIOHTTP vulnerable to brute-force leak of internal static file path components
### Summary
Path normalization for static files prevents path traversal, but opens up the ability for an attacker to ascertain the
existence of absolute path components.
### Impact
If an application uses `web.static()` (not recommended for production deployments), it may be possible for an attacker to ascertain the existence of path components.
------
Patch: https://github.com/aio-libs/aiohttp/commit/f2a86fd5ac0383000d1715afddfa704413f0711e |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2025-69226 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19575 |
| published_at |
2026-04-29T12:55:00Z |
|
| 1 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19611 |
| published_at |
2026-04-26T12:55:00Z |
|
| 2 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19625 |
| published_at |
2026-04-24T12:55:00Z |
|
| 3 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.1973 |
| published_at |
2026-04-21T12:55:00Z |
|
| 4 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19718 |
| published_at |
2026-04-18T12:55:00Z |
|
| 5 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19716 |
| published_at |
2026-04-16T12:55:00Z |
|
| 6 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19982 |
| published_at |
2026-04-04T12:55:00Z |
|
| 7 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.1984 |
| published_at |
2026-04-09T12:55:00Z |
|
| 8 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19788 |
| published_at |
2026-04-08T12:55:00Z |
|
| 9 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19708 |
| published_at |
2026-04-07T12:55:00Z |
|
| 10 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19741 |
| published_at |
2026-04-13T12:55:00Z |
|
| 11 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19927 |
| published_at |
2026-04-02T12:55:00Z |
|
| 12 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19798 |
| published_at |
2026-04-12T12:55:00Z |
|
| 13 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19843 |
| published_at |
2026-04-11T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2025-69226 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
|
| fixed_packages |
|
| aliases |
CVE-2025-69226, GHSA-54jq-c3m8-4m76
|
| risk_score |
2.9 |
| exploitability |
0.5 |
| weighted_severity |
5.7 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-vqvz-jfqh-jkaz |
|
| 17 |
| url |
VCID-zm3a-mf2z-xfcm |
| vulnerability_id |
VCID-zm3a-mf2z-xfcm |
| summary |
AIOHTTP Vulnerable to Cookie Parser Warning Storm
### Summary
Reading multiple invalid cookies can lead to a logging storm.
### Impact
If the ``cookies`` attribute is accessed in an application, then an attacker may be able to trigger a storm of warning-level logs using a specially crafted Cookie header.
----
Patch: https://github.com/aio-libs/aiohttp/commit/64629a0834f94e46d9881f4e99c41a137e1f3326 |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2025-69230 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02675 |
| published_at |
2026-04-29T12:55:00Z |
|
| 1 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02618 |
| published_at |
2026-04-26T12:55:00Z |
|
| 2 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02629 |
| published_at |
2026-04-24T12:55:00Z |
|
| 3 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02641 |
| published_at |
2026-04-21T12:55:00Z |
|
| 4 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02533 |
| published_at |
2026-04-18T12:55:00Z |
|
| 5 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02528 |
| published_at |
2026-04-16T12:55:00Z |
|
| 6 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02546 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02572 |
| published_at |
2026-04-09T12:55:00Z |
|
| 8 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02543 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02551 |
| published_at |
2026-04-08T12:55:00Z |
|
| 10 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02541 |
| published_at |
2026-04-13T12:55:00Z |
|
| 11 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02529 |
| published_at |
2026-04-02T12:55:00Z |
|
| 12 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02554 |
| published_at |
2026-04-11T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2025-69230 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
|
| fixed_packages |
|
| aliases |
CVE-2025-69230, GHSA-fh55-r93g-j68g
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
4.9 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-zm3a-mf2z-xfcm |
|