Lookup for vulnerable packages by Package URL.

Purlpkg:ebuild/dev-python/requests@2.31.0
Typeebuild
Namespacedev-python
Namerequests
Version2.31.0
Qualifiers
Subpath
Is_vulnerablefalse
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-a3cx-5ju5-27ez
vulnerability_id VCID-a3cx-5ju5-27ez
summary Requests is a HTTP library. Since Requests 2.3.0, Requests has been leaking Proxy-Authorization headers to destination servers when redirected to an HTTPS endpoint. This is a product of how we use `rebuild_proxies` to reattach the `Proxy-Authorization` header to requests. For HTTP connections sent through the tunnel, the proxy will identify the header in the request itself and remove it prior to forwarding to the destination server. However when sent over HTTPS, the `Proxy-Authorization` header must be sent in the CONNECT request as the proxy has no visibility into the tunneled request. This results in Requests forwarding proxy credentials to the destination server unintentionally, allowing a malicious actor to potentially exfiltrate sensitive information. This issue has been patched in version 2.31.0.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-32681.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-32681.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-32681
reference_id
reference_type
scores
0
value 0.06121
scoring_system epss
scoring_elements 0.90802
published_at 2026-04-12T12:55:00Z
1
value 0.06121
scoring_system epss
scoring_elements 0.90817
published_at 2026-04-18T12:55:00Z
2
value 0.06121
scoring_system epss
scoring_elements 0.90794
published_at 2026-04-09T12:55:00Z
3
value 0.06121
scoring_system epss
scoring_elements 0.9082
published_at 2026-04-16T12:55:00Z
4
value 0.06121
scoring_system epss
scoring_elements 0.908
published_at 2026-04-13T12:55:00Z
5
value 0.06278
scoring_system epss
scoring_elements 0.90904
published_at 2026-04-07T12:55:00Z
6
value 0.06278
scoring_system epss
scoring_elements 0.90952
published_at 2026-04-21T12:55:00Z
7
value 0.06278
scoring_system epss
scoring_elements 0.90884
published_at 2026-04-02T12:55:00Z
8
value 0.06278
scoring_system epss
scoring_elements 0.90915
published_at 2026-04-08T12:55:00Z
9
value 0.06278
scoring_system epss
scoring_elements 0.90894
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-32681
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32681
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32681
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://github.com/psf/requests
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/psf/requests
5
reference_url https://github.com/psf/requests/commit/74ea7cf7a6a27a4eeb2ae24e162bcc942a6706d5
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-14T19:35:47Z/
url https://github.com/psf/requests/commit/74ea7cf7a6a27a4eeb2ae24e162bcc942a6706d5
6
reference_url https://github.com/psf/requests/releases/tag/v2.31.0
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-14T19:35:47Z/
url https://github.com/psf/requests/releases/tag/v2.31.0
7
reference_url https://github.com/psf/requests/security/advisories/GHSA-j8r2-6x86-q33q
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N
1
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-14T19:35:47Z/
url https://github.com/psf/requests/security/advisories/GHSA-j8r2-6x86-q33q
8
reference_url https://github.com/pypa/advisory-database/tree/main/vulns/requests/PYSEC-2023-74.yaml
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/pypa/advisory-database/tree/main/vulns/requests/PYSEC-2023-74.yaml
9
reference_url https://lists.debian.org/debian-lts-announce/2023/06/msg00018.html
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-14T19:35:47Z/
url https://lists.debian.org/debian-lts-announce/2023/06/msg00018.html
10
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AW7HNFGYP44RT3DUDQXG2QT3OEV2PJ7Y
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AW7HNFGYP44RT3DUDQXG2QT3OEV2PJ7Y
11
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AW7HNFGYP44RT3DUDQXG2QT3OEV2PJ7Y/
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-14T19:35:47Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AW7HNFGYP44RT3DUDQXG2QT3OEV2PJ7Y/
12
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KOYASTZDGQG2BWLSNBPL3TQRL2G7QYNZ
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KOYASTZDGQG2BWLSNBPL3TQRL2G7QYNZ
13
reference_url https://security.gentoo.org/glsa/202309-08
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-14T19:35:47Z/
url https://security.gentoo.org/glsa/202309-08
14
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1036693
reference_id 1036693
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1036693
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2209469
reference_id 2209469
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2209469
16
reference_url https://nvd.nist.gov/vuln/detail/CVE-2023-32681
reference_id CVE-2023-32681
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2023-32681
17
reference_url https://github.com/advisories/GHSA-j8r2-6x86-q33q
reference_id GHSA-j8r2-6x86-q33q
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-j8r2-6x86-q33q
18
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KOYASTZDGQG2BWLSNBPL3TQRL2G7QYNZ/
reference_id KOYASTZDGQG2BWLSNBPL3TQRL2G7QYNZ
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-14T19:35:47Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KOYASTZDGQG2BWLSNBPL3TQRL2G7QYNZ/
19
reference_url https://access.redhat.com/errata/RHSA-2023:4350
reference_id RHSA-2023:4350
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4350
20
reference_url https://access.redhat.com/errata/RHSA-2023:4520
reference_id RHSA-2023:4520
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4520
21
reference_url https://access.redhat.com/errata/RHSA-2023:4693
reference_id RHSA-2023:4693
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4693
22
reference_url https://access.redhat.com/errata/RHSA-2023:6793
reference_id RHSA-2023:6793
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6793
23
reference_url https://access.redhat.com/errata/RHSA-2023:6818
reference_id RHSA-2023:6818
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6818
24
reference_url https://access.redhat.com/errata/RHSA-2023:7034
reference_id RHSA-2023:7034
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7034
25
reference_url https://access.redhat.com/errata/RHSA-2023:7042
reference_id RHSA-2023:7042
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7042
26
reference_url https://access.redhat.com/errata/RHSA-2023:7050
reference_id RHSA-2023:7050
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7050
27
reference_url https://access.redhat.com/errata/RHSA-2024:0299
reference_id RHSA-2024:0299
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0299
28
reference_url https://usn.ubuntu.com/6155-1/
reference_id USN-6155-1
reference_type
scores
url https://usn.ubuntu.com/6155-1/
29
reference_url https://usn.ubuntu.com/6155-2/
reference_id USN-6155-2
reference_type
scores
url https://usn.ubuntu.com/6155-2/
30
reference_url https://usn.ubuntu.com/7568-1/
reference_id USN-7568-1
reference_type
scores
url https://usn.ubuntu.com/7568-1/
31
reference_url https://usn.ubuntu.com/7762-1/
reference_id USN-7762-1
reference_type
scores
url https://usn.ubuntu.com/7762-1/
fixed_packages
0
url pkg:ebuild/dev-python/requests@2.31.0
purl pkg:ebuild/dev-python/requests@2.31.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-python/requests@2.31.0
aliases CVE-2023-32681, GHSA-j8r2-6x86-q33q, PYSEC-2023-74
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-a3cx-5ju5-27ez
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:ebuild/dev-python/requests@2.31.0