Lookup for vulnerable packages by Package URL.

Purlpkg:pypi/requests@0.6.3
Typepypi
Namespace
Namerequests
Version0.6.3
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version2.32.4
Latest_non_vulnerable_version2.33.0
Affected_by_vulnerabilities
0
url VCID-1mw1-384y-huc7
vulnerability_id VCID-1mw1-384y-huc7
summary
Uncontrolled Resource Consumption
Algorithmic complexity vulnerability in the `ssl.match_hostname` function and unspecified versions of python-backports-ssl_match_hostname as used for older Python versions, allows remote attackers to cause a denial of service (CPU consumption) via multiple wildcard characters in the common name in a certificate.
references
0
reference_url http://bugs.python.org/issue17980
reference_id
reference_type
scores
url http://bugs.python.org/issue17980
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2099.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2099.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-2099
reference_id
reference_type
scores
0
value 0.05238
scoring_system epss
scoring_elements 0.89926
published_at 2026-04-01T12:55:00Z
1
value 0.05238
scoring_system epss
scoring_elements 0.89929
published_at 2026-04-02T12:55:00Z
2
value 0.05238
scoring_system epss
scoring_elements 0.89942
published_at 2026-04-04T12:55:00Z
3
value 0.05238
scoring_system epss
scoring_elements 0.89948
published_at 2026-04-07T12:55:00Z
4
value 0.05238
scoring_system epss
scoring_elements 0.89964
published_at 2026-04-08T12:55:00Z
5
value 0.05238
scoring_system epss
scoring_elements 0.8997
published_at 2026-04-09T12:55:00Z
6
value 0.05238
scoring_system epss
scoring_elements 0.89978
published_at 2026-04-11T12:55:00Z
7
value 0.05238
scoring_system epss
scoring_elements 0.89976
published_at 2026-04-12T12:55:00Z
8
value 0.05238
scoring_system epss
scoring_elements 0.89969
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-2099
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-2099
reference_id
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-2099
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2099
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2099
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=709066
reference_id 709066
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=709066
6
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=709067
reference_id 709067
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=709067
7
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=709068
reference_id 709068
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=709068
8
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=709069
reference_id 709069
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=709069
9
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=709070
reference_id 709070
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=709070
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=963260
reference_id 963260
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=963260
11
reference_url https://security.gentoo.org/glsa/201401-04
reference_id GLSA-201401-04
reference_type
scores
url https://security.gentoo.org/glsa/201401-04
12
reference_url https://access.redhat.com/errata/RHSA-2014:1263
reference_id RHSA-2014:1263
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1263
13
reference_url https://access.redhat.com/errata/RHSA-2014:1690
reference_id RHSA-2014:1690
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1690
14
reference_url https://access.redhat.com/errata/RHSA-2015:0042
reference_id RHSA-2015:0042
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0042
15
reference_url https://access.redhat.com/errata/RHSA-2016:1166
reference_id RHSA-2016:1166
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1166
16
reference_url https://usn.ubuntu.com/1983-1/
reference_id USN-1983-1
reference_type
scores
url https://usn.ubuntu.com/1983-1/
17
reference_url https://usn.ubuntu.com/1984-1/
reference_id USN-1984-1
reference_type
scores
url https://usn.ubuntu.com/1984-1/
18
reference_url https://usn.ubuntu.com/1985-1/
reference_id USN-1985-1
reference_type
scores
url https://usn.ubuntu.com/1985-1/
fixed_packages
0
url pkg:pypi/requests@1.0.4
purl pkg:pypi/requests@1.0.4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4uhh-qs7z-bffx
1
vulnerability VCID-duvn-u125-dqan
2
vulnerability VCID-jgyy-eapg-f7c3
3
vulnerability VCID-pd4x-3cee-t7g3
4
vulnerability VCID-stx3-z3wu-pbat
resource_url http://public2.vulnerablecode.io/packages/pkg:pypi/requests@1.0.4
1
url pkg:pypi/requests@1.1.0
purl pkg:pypi/requests@1.1.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4uhh-qs7z-bffx
1
vulnerability VCID-duvn-u125-dqan
2
vulnerability VCID-jgyy-eapg-f7c3
3
vulnerability VCID-pd4x-3cee-t7g3
4
vulnerability VCID-stx3-z3wu-pbat
resource_url http://public2.vulnerablecode.io/packages/pkg:pypi/requests@1.1.0
aliases CVE-2013-2099
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1mw1-384y-huc7
1
url VCID-4uhh-qs7z-bffx
vulnerability_id VCID-4uhh-qs7z-bffx
summary Requests (aka python-requests) before 2.3.0 allows remote servers to obtain sensitive information by reading the Proxy-Authorization header in a redirected request.
references
0
reference_url http://advisories.mageia.org/MGASA-2014-0409.html
reference_id
reference_type
scores
0
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url http://advisories.mageia.org/MGASA-2014-0409.html
1
reference_url http://lists.opensuse.org/opensuse-updates/2016-01/msg00095.html
reference_id
reference_type
scores
0
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url http://lists.opensuse.org/opensuse-updates/2016-01/msg00095.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1830.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1830.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-1830
reference_id
reference_type
scores
0
value 0.00464
scoring_system epss
scoring_elements 0.64346
published_at 2026-04-11T12:55:00Z
1
value 0.00464
scoring_system epss
scoring_elements 0.64306
published_at 2026-04-13T12:55:00Z
2
value 0.00464
scoring_system epss
scoring_elements 0.64335
published_at 2026-04-12T12:55:00Z
3
value 0.00464
scoring_system epss
scoring_elements 0.64334
published_at 2026-04-09T12:55:00Z
4
value 0.00464
scoring_system epss
scoring_elements 0.64319
published_at 2026-04-08T12:55:00Z
5
value 0.00464
scoring_system epss
scoring_elements 0.64271
published_at 2026-04-07T12:55:00Z
6
value 0.00464
scoring_system epss
scoring_elements 0.64314
published_at 2026-04-04T12:55:00Z
7
value 0.00464
scoring_system epss
scoring_elements 0.64285
published_at 2026-04-02T12:55:00Z
8
value 0.00464
scoring_system epss
scoring_elements 0.64227
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-1830
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=733108
reference_id
reference_type
scores
0
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=733108
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1829
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1829
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1830
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1830
7
reference_url https://github.com/advisories/GHSA-652x-xj99-gmcc
reference_id
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-652x-xj99-gmcc
8
reference_url https://github.com/kennethreitz/requests/issues/1885
reference_id
reference_type
scores
0
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/kennethreitz/requests/issues/1885
9
reference_url https://github.com/psf/requests
reference_id
reference_type
scores
0
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/psf/requests
10
reference_url https://github.com/psf/requests/issues/1885
reference_id
reference_type
scores
0
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/psf/requests/issues/1885
11
reference_url https://github.com/pypa/advisory-database/tree/main/vulns/requests/PYSEC-2014-14.yaml
reference_id
reference_type
scores
0
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/pypa/advisory-database/tree/main/vulns/requests/PYSEC-2014-14.yaml
12
reference_url https://web.archive.org/web/20150523055216/http://www.mandriva.com/en/support/security/advisories/advisory/MDVSA-2015:133/?name=MDVSA-2015:133
reference_id
reference_type
scores
0
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://web.archive.org/web/20150523055216/http://www.mandriva.com/en/support/security/advisories/advisory/MDVSA-2015:133/?name=MDVSA-2015:133
13
reference_url http://www.debian.org/security/2015/dsa-3146
reference_id
reference_type
scores
0
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.debian.org/security/2015/dsa-3146
14
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2015:133
reference_id
reference_type
scores
0
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.mandriva.com/security/advisories?name=MDVSA-2015:133
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1144907
reference_id 1144907
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1144907
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:python:requests:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:python:requests:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:python:requests:*:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-1830
reference_id CVE-2014-1830
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:N/A:N
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2014-1830
19
reference_url https://usn.ubuntu.com/2382-1/
reference_id USN-2382-1
reference_type
scores
url https://usn.ubuntu.com/2382-1/
fixed_packages
0
url pkg:pypi/requests@2.3.0
purl pkg:pypi/requests@2.3.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-a3cx-5ju5-27ez
1
vulnerability VCID-b16q-djxv-m7c2
2
vulnerability VCID-duvn-u125-dqan
3
vulnerability VCID-pd4x-3cee-t7g3
4
vulnerability VCID-stx3-z3wu-pbat
resource_url http://public2.vulnerablecode.io/packages/pkg:pypi/requests@2.3.0
aliases CVE-2014-1830, GHSA-652x-xj99-gmcc, PYSEC-2014-14
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4uhh-qs7z-bffx
2
url VCID-duvn-u125-dqan
vulnerability_id VCID-duvn-u125-dqan
summary
Requests `Session` object does not verify requests after making first request with verify=False
When using a `requests.Session`, if the first request to a given origin is made with `verify=False`, TLS certificate verification may remain disabled for all subsequent requests to that origin, even if `verify=True` is explicitly specified later.

This occurs because the underlying connection is reused from the session's connection pool, causing the initial TLS verification setting to persist for the lifetime of the pooled connection. As a result, applications may unintentionally send requests without certificate verification, leading to potential man-in-the-middle attacks and compromised confidentiality or integrity.

This behavior affects versions of `requests` prior to 2.32.0.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-35195.json
reference_id
reference_type
scores
0
value 5.6
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-35195.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-35195
reference_id
reference_type
scores
0
value 0.00044
scoring_system epss
scoring_elements 0.1357
published_at 2026-04-13T12:55:00Z
1
value 0.00044
scoring_system epss
scoring_elements 0.13618
published_at 2026-04-12T12:55:00Z
2
value 0.00044
scoring_system epss
scoring_elements 0.13654
published_at 2026-04-11T12:55:00Z
3
value 0.00044
scoring_system epss
scoring_elements 0.13685
published_at 2026-04-09T12:55:00Z
4
value 0.00044
scoring_system epss
scoring_elements 0.13633
published_at 2026-04-08T12:55:00Z
5
value 0.00044
scoring_system epss
scoring_elements 0.13553
published_at 2026-04-07T12:55:00Z
6
value 0.00044
scoring_system epss
scoring_elements 0.13752
published_at 2026-04-04T12:55:00Z
7
value 0.00044
scoring_system epss
scoring_elements 0.13691
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-35195
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35195
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35195
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://github.com/psf/requests
reference_id
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/psf/requests
5
reference_url https://github.com/psf/requests/commit/a58d7f2ffb4d00b46dca2d70a3932a0b37e22fac
reference_id
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-21T14:17:58Z/
url https://github.com/psf/requests/commit/a58d7f2ffb4d00b46dca2d70a3932a0b37e22fac
6
reference_url https://github.com/psf/requests/pull/6655
reference_id
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-21T14:17:58Z/
url https://github.com/psf/requests/pull/6655
7
reference_url https://github.com/psf/requests/security/advisories/GHSA-9wx4-h78v-vm56
reference_id
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:N
1
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-21T14:17:58Z/
url https://github.com/psf/requests/security/advisories/GHSA-9wx4-h78v-vm56
8
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IYLSNK5TL46Q6XPRVMHVWS63MVJQOK4Q
reference_id
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IYLSNK5TL46Q6XPRVMHVWS63MVJQOK4Q
9
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N7WP6EYDSUOCOJYHDK5NX43PYZ4SNHGZ
reference_id
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N7WP6EYDSUOCOJYHDK5NX43PYZ4SNHGZ
10
reference_url https://nvd.nist.gov/vuln/detail/CVE-2024-35195
reference_id
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2024-35195
11
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1071593
reference_id 1071593
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1071593
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2282114
reference_id 2282114
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2282114
13
reference_url https://github.com/advisories/GHSA-9wx4-h78v-vm56
reference_id GHSA-9wx4-h78v-vm56
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-9wx4-h78v-vm56
14
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IYLSNK5TL46Q6XPRVMHVWS63MVJQOK4Q/
reference_id IYLSNK5TL46Q6XPRVMHVWS63MVJQOK4Q
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-21T14:17:58Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IYLSNK5TL46Q6XPRVMHVWS63MVJQOK4Q/
15
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N7WP6EYDSUOCOJYHDK5NX43PYZ4SNHGZ/
reference_id N7WP6EYDSUOCOJYHDK5NX43PYZ4SNHGZ
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-21T14:17:58Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N7WP6EYDSUOCOJYHDK5NX43PYZ4SNHGZ/
16
reference_url https://access.redhat.com/errata/RHSA-2024:3781
reference_id RHSA-2024:3781
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3781
17
reference_url https://access.redhat.com/errata/RHSA-2024:4522
reference_id RHSA-2024:4522
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4522
18
reference_url https://access.redhat.com/errata/RHSA-2024:9988
reference_id RHSA-2024:9988
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9988
19
reference_url https://access.redhat.com/errata/RHSA-2025:0012
reference_id RHSA-2025:0012
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0012
20
reference_url https://access.redhat.com/errata/RHSA-2025:1335
reference_id RHSA-2025:1335
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:1335
21
reference_url https://access.redhat.com/errata/RHSA-2025:2399
reference_id RHSA-2025:2399
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:2399
22
reference_url https://access.redhat.com/errata/RHSA-2025:7049
reference_id RHSA-2025:7049
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:7049
23
reference_url https://access.redhat.com/errata/RHSA-2025:8385
reference_id RHSA-2025:8385
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:8385
fixed_packages
0
url pkg:pypi/requests@2.32.0
purl pkg:pypi/requests@2.32.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-stx3-z3wu-pbat
resource_url http://public2.vulnerablecode.io/packages/pkg:pypi/requests@2.32.0
aliases CVE-2024-35195, GHSA-9wx4-h78v-vm56
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-duvn-u125-dqan
3
url VCID-h1dz-4a4m-bua9
vulnerability_id VCID-h1dz-4a4m-bua9
summary When using digest authentication with a wrong password, `requests` will retry the request for infinity. This makes the package vulnerable to Denial of Service (DoS).
references
0
reference_url https://github.com/requests/requests/issues/541
reference_id
reference_type
scores
url https://github.com/requests/requests/issues/541
1
reference_url https://github.com/requests/requests/pull/547
reference_id
reference_type
scores
url https://github.com/requests/requests/pull/547
2
reference_url https://github.com/requests/requests/pull/547/commits/c3e6c41fc164d4348f8ce197bd0075aff05637af
reference_id
reference_type
scores
url https://github.com/requests/requests/pull/547/commits/c3e6c41fc164d4348f8ce197bd0075aff05637af
fixed_packages
0
url pkg:pypi/requests@0.12.0
purl pkg:pypi/requests@0.12.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1mw1-384y-huc7
1
vulnerability VCID-4uhh-qs7z-bffx
2
vulnerability VCID-duvn-u125-dqan
3
vulnerability VCID-jgyy-eapg-f7c3
4
vulnerability VCID-pd4x-3cee-t7g3
5
vulnerability VCID-stx3-z3wu-pbat
resource_url http://public2.vulnerablecode.io/packages/pkg:pypi/requests@0.12.0
1
url pkg:pypi/requests@0.12.01
purl pkg:pypi/requests@0.12.01
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1mw1-384y-huc7
1
vulnerability VCID-4uhh-qs7z-bffx
2
vulnerability VCID-duvn-u125-dqan
3
vulnerability VCID-jgyy-eapg-f7c3
4
vulnerability VCID-pd4x-3cee-t7g3
5
vulnerability VCID-stx3-z3wu-pbat
resource_url http://public2.vulnerablecode.io/packages/pkg:pypi/requests@0.12.01
aliases GMS-2012-3
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-h1dz-4a4m-bua9
4
url VCID-jgyy-eapg-f7c3
vulnerability_id VCID-jgyy-eapg-f7c3
summary Requests (aka python-requests) before 2.3.0 allows remote servers to obtain a netrc password by reading the Authorization header in a redirected request.
references
0
reference_url http://advisories.mageia.org/MGASA-2014-0409.html
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
2
value MODERATE
scoring_system generic_textual
scoring_elements
url http://advisories.mageia.org/MGASA-2014-0409.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1829.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1829.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-1829
reference_id
reference_type
scores
0
value 0.00495
scoring_system epss
scoring_elements 0.65801
published_at 2026-04-11T12:55:00Z
1
value 0.00495
scoring_system epss
scoring_elements 0.6578
published_at 2026-04-09T12:55:00Z
2
value 0.00495
scoring_system epss
scoring_elements 0.65769
published_at 2026-04-08T12:55:00Z
3
value 0.00495
scoring_system epss
scoring_elements 0.65716
published_at 2026-04-07T12:55:00Z
4
value 0.00495
scoring_system epss
scoring_elements 0.6575
published_at 2026-04-04T12:55:00Z
5
value 0.00495
scoring_system epss
scoring_elements 0.6572
published_at 2026-04-02T12:55:00Z
6
value 0.00495
scoring_system epss
scoring_elements 0.65787
published_at 2026-04-12T12:55:00Z
7
value 0.00495
scoring_system epss
scoring_elements 0.6567
published_at 2026-04-01T12:55:00Z
8
value 0.00495
scoring_system epss
scoring_elements 0.65757
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-1829
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=733108
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=733108
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1829
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1829
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1830
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1830
6
reference_url https://github.com/advisories/GHSA-cfj3-7x9c-4p3h
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
2
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
3
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/advisories/GHSA-cfj3-7x9c-4p3h
7
reference_url https://github.com/kennethreitz/requests/issues/1885
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/kennethreitz/requests/issues/1885
8
reference_url https://github.com/psf/requests
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/psf/requests
9
reference_url https://github.com/psf/requests/issues/1885
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/psf/requests/issues/1885
10
reference_url https://github.com/pypa/advisory-database/tree/main/vulns/requests/PYSEC-2014-13.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/pypa/advisory-database/tree/main/vulns/requests/PYSEC-2014-13.yaml
11
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-1829
reference_id
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:N/A:N
1
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
2
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
3
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2014-1829
12
reference_url https://web.archive.org/web/20150523055216/http://www.mandriva.com/en/support/security/advisories/advisory/MDVSA-2015:133/?name=MDVSA-2015:133
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://web.archive.org/web/20150523055216/http://www.mandriva.com/en/support/security/advisories/advisory/MDVSA-2015:133/?name=MDVSA-2015:133
13
reference_url http://www.debian.org/security/2015/dsa-3146
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
2
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.debian.org/security/2015/dsa-3146
14
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2015:133
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
2
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.mandriva.com/security/advisories?name=MDVSA-2015:133
15
reference_url http://www.ubuntu.com/usn/USN-2382-1
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
2
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.ubuntu.com/usn/USN-2382-1
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1046626
reference_id 1046626
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1046626
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:python:requests:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:python:requests:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:python:requests:*:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mageia:mageia:4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:mageia:mageia:4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mageia:mageia:4.0:*:*:*:*:*:*:*
21
reference_url https://usn.ubuntu.com/2382-1/
reference_id USN-2382-1
reference_type
scores
url https://usn.ubuntu.com/2382-1/
fixed_packages
0
url pkg:pypi/requests@2.3.0
purl pkg:pypi/requests@2.3.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-a3cx-5ju5-27ez
1
vulnerability VCID-b16q-djxv-m7c2
2
vulnerability VCID-duvn-u125-dqan
3
vulnerability VCID-pd4x-3cee-t7g3
4
vulnerability VCID-stx3-z3wu-pbat
resource_url http://public2.vulnerablecode.io/packages/pkg:pypi/requests@2.3.0
aliases CVE-2014-1829, GHSA-cfj3-7x9c-4p3h, PYSEC-2014-13
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jgyy-eapg-f7c3
5
url VCID-pd4x-3cee-t7g3
vulnerability_id VCID-pd4x-3cee-t7g3
summary The Requests package before 2.20.0 for Python sends an HTTP Authorization header to an http URI upon receiving a same-hostname https-to-http redirect, which makes it easier for remote attackers to discover credentials by sniffing the network.
references
0
reference_url http://docs.python-requests.org/en/master/community/updates/#release-and-version-history
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url http://docs.python-requests.org/en/master/community/updates/#release-and-version-history
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00024.html
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00024.html
2
reference_url https://access.redhat.com/errata/RHSA-2019:2035
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2019:2035
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-18074.json
reference_id
reference_type
scores
0
value 2.6
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-18074.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-18074
reference_id
reference_type
scores
0
value 0.00243
scoring_system epss
scoring_elements 0.47508
published_at 2026-04-09T12:55:00Z
1
value 0.00243
scoring_system epss
scoring_elements 0.47514
published_at 2026-04-13T12:55:00Z
2
value 0.00243
scoring_system epss
scoring_elements 0.47507
published_at 2026-04-12T12:55:00Z
3
value 0.00243
scoring_system epss
scoring_elements 0.47531
published_at 2026-04-11T12:55:00Z
4
value 0.00243
scoring_system epss
scoring_elements 0.47512
published_at 2026-04-08T12:55:00Z
5
value 0.00243
scoring_system epss
scoring_elements 0.47457
published_at 2026-04-07T12:55:00Z
6
value 0.00243
scoring_system epss
scoring_elements 0.47456
published_at 2026-04-01T12:55:00Z
7
value 0.00243
scoring_system epss
scoring_elements 0.47487
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-18074
5
reference_url https://bugs.debian.org/910766
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://bugs.debian.org/910766
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18074
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18074
7
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
8
reference_url https://github.com/advisories/GHSA-x84v-xcm2-53pg
reference_id
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-x84v-xcm2-53pg
9
reference_url https://github.com/pypa/advisory-database/tree/main/vulns/requests/PYSEC-2018-28.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/pypa/advisory-database/tree/main/vulns/requests/PYSEC-2018-28.yaml
10
reference_url https://github.com/requests/requests
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/requests/requests
11
reference_url https://github.com/requests/requests/commit/c45d7c49ea75133e52ab22a8e9e13173938e36ff
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/requests/requests/commit/c45d7c49ea75133e52ab22a8e9e13173938e36ff
12
reference_url https://github.com/requests/requests/issues/4716
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/requests/requests/issues/4716
13
reference_url https://github.com/requests/requests/pull/4718
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/requests/requests/pull/4718
14
reference_url https://usn.ubuntu.com/3790-1
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://usn.ubuntu.com/3790-1
15
reference_url https://usn.ubuntu.com/3790-1/
reference_id
reference_type
scores
url https://usn.ubuntu.com/3790-1/
16
reference_url https://usn.ubuntu.com/3790-2
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://usn.ubuntu.com/3790-2
17
reference_url https://usn.ubuntu.com/3790-2/
reference_id
reference_type
scores
url https://usn.ubuntu.com/3790-2/
18
reference_url https://www.oracle.com/security-alerts/cpujul2022.html
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://www.oracle.com/security-alerts/cpujul2022.html
19
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1643829
reference_id 1643829
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1643829
20
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=910766
reference_id 910766
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=910766
21
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-18074
reference_id CVE-2018-18074
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2018-18074
22
reference_url https://access.redhat.com/errata/RHSA-2020:0850
reference_id RHSA-2020:0850
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0850
23
reference_url https://access.redhat.com/errata/RHSA-2020:0851
reference_id RHSA-2020:0851
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0851
24
reference_url https://access.redhat.com/errata/RHSA-2020:1605
reference_id RHSA-2020:1605
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1605
25
reference_url https://access.redhat.com/errata/RHSA-2020:1916
reference_id RHSA-2020:1916
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1916
26
reference_url https://access.redhat.com/errata/RHSA-2020:2068
reference_id RHSA-2020:2068
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2068
27
reference_url https://access.redhat.com/errata/RHSA-2020:2081
reference_id RHSA-2020:2081
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2081
fixed_packages
0
url pkg:pypi/requests@2.20.0
purl pkg:pypi/requests@2.20.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-a3cx-5ju5-27ez
1
vulnerability VCID-duvn-u125-dqan
2
vulnerability VCID-stx3-z3wu-pbat
resource_url http://public2.vulnerablecode.io/packages/pkg:pypi/requests@2.20.0
aliases CVE-2018-18074, GHSA-x84v-xcm2-53pg, PYSEC-2018-28
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pd4x-3cee-t7g3
6
url VCID-stx3-z3wu-pbat
vulnerability_id VCID-stx3-z3wu-pbat
summary
Requests vulnerable to .netrc credentials leak via malicious URLs
### Impact

Due to a URL parsing issue, Requests releases prior to 2.32.4 may leak .netrc credentials to third parties for specific maliciously-crafted URLs.

### Workarounds
For older versions of Requests, use of the .netrc file can be disabled with `trust_env=False` on your Requests Session ([docs](https://requests.readthedocs.io/en/latest/api/#requests.Session.trust_env)).

### References
https://github.com/psf/requests/pull/6965
https://seclists.org/fulldisclosure/2025/Jun/2
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47081.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47081.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-47081
reference_id
reference_type
scores
0
value 0.0007
scoring_system epss
scoring_elements 0.2163
published_at 2026-04-02T12:55:00Z
1
value 0.0007
scoring_system epss
scoring_elements 0.21688
published_at 2026-04-04T12:55:00Z
2
value 0.00208
scoring_system epss
scoring_elements 0.4327
published_at 2026-04-11T12:55:00Z
3
value 0.00208
scoring_system epss
scoring_elements 0.43248
published_at 2026-04-09T12:55:00Z
4
value 0.00208
scoring_system epss
scoring_elements 0.43236
published_at 2026-04-08T12:55:00Z
5
value 0.00208
scoring_system epss
scoring_elements 0.43222
published_at 2026-04-13T12:55:00Z
6
value 0.00208
scoring_system epss
scoring_elements 0.43185
published_at 2026-04-07T12:55:00Z
7
value 0.00208
scoring_system epss
scoring_elements 0.43238
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-47081
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47081
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47081
3
reference_url http://seclists.org/fulldisclosure/2025/Jun/2
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url http://seclists.org/fulldisclosure/2025/Jun/2
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://github.com/psf/requests
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/psf/requests
6
reference_url https://github.com/psf/requests/commit/96ba401c1296ab1dda74a2365ef36d88f7d144ef
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T18:39:03Z/
url https://github.com/psf/requests/commit/96ba401c1296ab1dda74a2365ef36d88f7d144ef
7
reference_url https://github.com/psf/requests/pull/6965
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T18:39:03Z/
url https://github.com/psf/requests/pull/6965
8
reference_url https://github.com/psf/requests/security/advisories/GHSA-9hjg-9r4m-mvj7
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T18:39:03Z/
url https://github.com/psf/requests/security/advisories/GHSA-9hjg-9r4m-mvj7
9
reference_url https://nvd.nist.gov/vuln/detail/CVE-2024-47081
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2024-47081
10
reference_url https://requests.readthedocs.io/en/latest/api/#requests.Session.trust_env
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T18:39:03Z/
url https://requests.readthedocs.io/en/latest/api/#requests.Session.trust_env
11
reference_url https://seclists.org/fulldisclosure/2025/Jun/2
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T18:39:03Z/
url https://seclists.org/fulldisclosure/2025/Jun/2
12
reference_url http://www.openwall.com/lists/oss-security/2025/06/03/11
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2025/06/03/11
13
reference_url http://www.openwall.com/lists/oss-security/2025/06/03/9
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2025/06/03/9
14
reference_url http://www.openwall.com/lists/oss-security/2025/06/04/1
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2025/06/04/1
15
reference_url http://www.openwall.com/lists/oss-security/2025/06/04/6
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2025/06/04/6
16
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1107368
reference_id 1107368
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1107368
17
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2371272
reference_id 2371272
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2371272
18
reference_url https://github.com/advisories/GHSA-9hjg-9r4m-mvj7
reference_id GHSA-9hjg-9r4m-mvj7
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-9hjg-9r4m-mvj7
19
reference_url https://access.redhat.com/errata/RHSA-2025:12519
reference_id RHSA-2025:12519
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:12519
20
reference_url https://access.redhat.com/errata/RHSA-2025:13234
reference_id RHSA-2025:13234
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:13234
21
reference_url https://access.redhat.com/errata/RHSA-2025:13604
reference_id RHSA-2025:13604
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:13604
22
reference_url https://access.redhat.com/errata/RHSA-2025:14750
reference_id RHSA-2025:14750
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14750
23
reference_url https://access.redhat.com/errata/RHSA-2025:14999
reference_id RHSA-2025:14999
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14999
24
reference_url https://access.redhat.com/errata/RHSA-2025:15121
reference_id RHSA-2025:15121
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:15121
25
reference_url https://access.redhat.com/errata/RHSA-2025:15122
reference_id RHSA-2025:15122
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:15122
26
reference_url https://access.redhat.com/errata/RHSA-2025:15614
reference_id RHSA-2025:15614
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:15614
27
reference_url https://access.redhat.com/errata/RHSA-2025:15615
reference_id RHSA-2025:15615
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:15615
28
reference_url https://access.redhat.com/errata/RHSA-2025:15616
reference_id RHSA-2025:15616
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:15616
29
reference_url https://access.redhat.com/errata/RHSA-2025:15617
reference_id RHSA-2025:15617
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:15617
30
reference_url https://access.redhat.com/errata/RHSA-2025:15618
reference_id RHSA-2025:15618
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:15618
31
reference_url https://access.redhat.com/errata/RHSA-2025:15622
reference_id RHSA-2025:15622
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:15622
32
reference_url https://access.redhat.com/errata/RHSA-2025:15691
reference_id RHSA-2025:15691
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:15691
33
reference_url https://access.redhat.com/errata/RHSA-2025:15723
reference_id RHSA-2025:15723
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:15723
34
reference_url https://access.redhat.com/errata/RHSA-2026:4215
reference_id RHSA-2026:4215
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4215
35
reference_url https://usn.ubuntu.com/7568-1/
reference_id USN-7568-1
reference_type
scores
url https://usn.ubuntu.com/7568-1/
36
reference_url https://usn.ubuntu.com/7762-1/
reference_id USN-7762-1
reference_type
scores
url https://usn.ubuntu.com/7762-1/
fixed_packages
0
url pkg:pypi/requests@2.32.4
purl pkg:pypi/requests@2.32.4
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:pypi/requests@2.32.4
aliases CVE-2024-47081, GHSA-9hjg-9r4m-mvj7
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-stx3-z3wu-pbat
Fixing_vulnerabilities
Risk_score4.0
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:pypi/requests@0.6.3