Metrics
Affected Vendors & Products
Tue, 10 Jun 2025 06:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Redhat rhel Els
|
|
CPEs | cpe:/o:redhat:rhel_els:7 | |
Vendors & Products |
Redhat rhel Els
|
Sat, 31 May 2025 00:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
CPEs | cpe:/a:redhat:rhel_e4s:8.4::highavailability cpe:/a:redhat:rhel_tus:8.4::highavailability |
Thu, 29 May 2025 19:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Redhat rhel E4s
Redhat rhel Tus |
|
CPEs | cpe:/a:redhat:rhel_e4s:8.6::highavailability cpe:/a:redhat:rhel_e4s:9.0::highavailability cpe:/a:redhat:rhel_eus:8.8::highavailability cpe:/a:redhat:rhel_tus:8.6::highavailability |
|
Vendors & Products |
Redhat rhel E4s
Redhat rhel Tus |
Thu, 29 May 2025 06:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
Wed, 28 May 2025 17:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
CPEs | cpe:/a:redhat:enterprise_linux:8::highavailability |
Wed, 28 May 2025 14:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Redhat rhel Eus
|
|
CPEs | cpe:/a:redhat:rhel_eus:9.2 cpe:/a:redhat:rhel_eus:9.4 |
|
Vendors & Products |
Redhat rhel Eus
|
Tue, 27 May 2025 03:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
CPEs | cpe:/o:redhat:enterprise_linux:10.0 |
Mon, 26 May 2025 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Redhat
Redhat enterprise Linux |
|
CPEs | cpe:/a:redhat:enterprise_linux:9 | |
Vendors & Products |
Redhat
Redhat enterprise Linux |
Fri, 16 May 2025 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
| |
Metrics |
threat_severity
|
threat_severity
|
Fri, 16 May 2025 14:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Thu, 15 May 2025 21:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Tornado is a Python web framework and asynchronous networking library. When Tornado's ``multipart/form-data`` parser encounters certain errors, it logs a warning but continues trying to parse the remainder of the data. This allows remote attackers to generate an extremely high volume of logs, constituting a DoS attack. This DoS is compounded by the fact that the logging subsystem is synchronous. All versions of Tornado prior to 6.5.0 are affected. The vulnerable parser is enabled by default. Upgrade to Tornado version 6.50 to receive a patch. As a workaround, risk can be mitigated by blocking `Content-Type: multipart/form-data` in a proxy. | |
Title | Tornado vulnerable to excessive logging caused by malformed multipart form data | |
Weaknesses | CWE-770 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: GitHub_M
Published: 2025-05-15T21:17:55.188Z
Updated: 2025-05-29T06:04:05.899Z
Reserved: 2025-05-05T16:53:10.374Z
Link: CVE-2025-47287

Updated: 2025-05-29T06:04:05.899Z

Status : Awaiting Analysis
Published: 2025-05-15T22:15:18.827
Modified: 2025-05-29T06:15:23.090
Link: CVE-2025-47287
