Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-4445-1 | python3.9 security update |
Ubuntu USN |
USN-7951-1 | Python vulnerability |
Tue, 10 Feb 2026 20:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
cvssV3_1
|
Mon, 09 Feb 2026 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-125 |
Mon, 26 Jan 2026 14:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Tue, 30 Dec 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Python python
|
|
| Weaknesses | CWE-125 | |
| CPEs | cpe:2.3:a:python:python:*:*:*:*:*:*:*:* cpe:2.3:a:python:python:3.14.0:-:*:*:*:*:*:* cpe:2.3:a:python:python:3.15.0:alpha1:*:*:*:*:*:* cpe:2.3:a:python:python:3.15.0:alpha2:*:*:*:*:*:* |
|
| Vendors & Products |
Python python
|
|
| Metrics |
cvssV3_1
|
cvssV3_1
|
Mon, 22 Dec 2025 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Fri, 05 Dec 2025 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Wed, 03 Dec 2025 00:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-770 | |
| References |
| |
| Metrics |
threat_severity
|
cvssV3_1
|
Tue, 02 Dec 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-400 |
Tue, 02 Dec 2025 17:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Tue, 02 Dec 2025 12:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Python
Python cpython |
|
| Vendors & Products |
Python
Python cpython |
Mon, 01 Dec 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
| |
| Metrics |
ssvc
|
Mon, 01 Dec 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | When reading an HTTP response from a server, if no read amount is specified, the default behavior will be to use Content-Length. This allows a malicious server to cause the client to read large amounts of data into memory, potentially causing OOM or other DoS. | |
| Title | Excessive read buffering DoS in http.client | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: PSF
Published:
Updated: 2026-03-03T14:41:48.702Z
Reserved: 2025-12-01T17:54:40.759Z
Link: CVE-2025-13836
Updated: 2025-12-01T18:32:42.784Z
Status : Analyzed
Published: 2025-12-01T18:16:04.200
Modified: 2026-02-10T19:58:12.130
Link: CVE-2025-13836
OpenCVE Enrichment
Updated: 2025-12-02T11:58:49Z
Debian DLA
Ubuntu USN