Encode Starlette 0.7.2 for Python

CPE Details

Encode Starlette 0.7.2 for Python
0.7.2
2023-04-27
14h25 +00:00
2023-05-01
11h23 +00:00
Alerte pour un CPE
Restez informé de toutes modifications pour un CPE spécifique.
Gestion des notifications

CPE Name: cpe:2.3:a:encode:starlette:0.7.2:*:*:*:*:python:*:*

Informations

Vendor

encode

Product

starlette

Version

0.7.2

Target Software

python

Related CVE

Open and find in CVE List

CVE ID Publié Description Score Gravité
CVE-2024-24762 2024-02-05 14h33 +00:00 `python-multipart` is a streaming multipart parser for Python. When using form data, `python-multipart` uses a Regular Expression to parse the HTTP `Content-Type` header, including options. An attacker could send a custom-made `Content-Type` option that is very difficult for the RegEx to process, consuming CPU resources and stalling indefinitely (minutes or more) while holding the main event loop. This means that process can't handle any more requests, leading to regular expression denial of service. This vulnerability has been patched in version 0.0.7.
7.5
Haute
CVE-2023-30798 2023-04-21 15h27 +00:00 There MultipartParser usage in Encode's Starlette python framework before versions 0.25.0 allows an unauthenticated and remote attacker to specify any number of form fields or files which can cause excessive memory usage resulting in denial of service of the HTTP service.
7.5
Haute