Lookup for vulnerable packages by Package URL.

Purlpkg:pypi/requests@2.16.0
Typepypi
Namespace
Namerequests
Version2.16.0
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version2.32.4
Latest_non_vulnerable_version2.33.0
Affected_by_vulnerabilities
0
url VCID-a3cx-5ju5-27ez
vulnerability_id VCID-a3cx-5ju5-27ez
summary Requests is a HTTP library. Since Requests 2.3.0, Requests has been leaking Proxy-Authorization headers to destination servers when redirected to an HTTPS endpoint. This is a product of how we use `rebuild_proxies` to reattach the `Proxy-Authorization` header to requests. For HTTP connections sent through the tunnel, the proxy will identify the header in the request itself and remove it prior to forwarding to the destination server. However when sent over HTTPS, the `Proxy-Authorization` header must be sent in the CONNECT request as the proxy has no visibility into the tunneled request. This results in Requests forwarding proxy credentials to the destination server unintentionally, allowing a malicious actor to potentially exfiltrate sensitive information. This issue has been patched in version 2.31.0.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-32681.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-32681.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-32681
reference_id
reference_type
scores
0
value 0.06121
scoring_system epss
scoring_elements 0.908
published_at 2026-04-13T12:55:00Z
1
value 0.06121
scoring_system epss
scoring_elements 0.90794
published_at 2026-04-09T12:55:00Z
2
value 0.06121
scoring_system epss
scoring_elements 0.90802
published_at 2026-04-12T12:55:00Z
3
value 0.06278
scoring_system epss
scoring_elements 0.90904
published_at 2026-04-07T12:55:00Z
4
value 0.06278
scoring_system epss
scoring_elements 0.90884
published_at 2026-04-02T12:55:00Z
5
value 0.06278
scoring_system epss
scoring_elements 0.90915
published_at 2026-04-08T12:55:00Z
6
value 0.06278
scoring_system epss
scoring_elements 0.90894
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-32681
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32681
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32681
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://github.com/psf/requests
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/psf/requests
5
reference_url https://github.com/psf/requests/commit/74ea7cf7a6a27a4eeb2ae24e162bcc942a6706d5
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-14T19:35:47Z/
url https://github.com/psf/requests/commit/74ea7cf7a6a27a4eeb2ae24e162bcc942a6706d5
6
reference_url https://github.com/psf/requests/releases/tag/v2.31.0
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-14T19:35:47Z/
url https://github.com/psf/requests/releases/tag/v2.31.0
7
reference_url https://github.com/psf/requests/security/advisories/GHSA-j8r2-6x86-q33q
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N
1
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-14T19:35:47Z/
url https://github.com/psf/requests/security/advisories/GHSA-j8r2-6x86-q33q
8
reference_url https://github.com/pypa/advisory-database/tree/main/vulns/requests/PYSEC-2023-74.yaml
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/pypa/advisory-database/tree/main/vulns/requests/PYSEC-2023-74.yaml
9
reference_url https://lists.debian.org/debian-lts-announce/2023/06/msg00018.html
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-14T19:35:47Z/
url https://lists.debian.org/debian-lts-announce/2023/06/msg00018.html
10
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AW7HNFGYP44RT3DUDQXG2QT3OEV2PJ7Y
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AW7HNFGYP44RT3DUDQXG2QT3OEV2PJ7Y
11
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AW7HNFGYP44RT3DUDQXG2QT3OEV2PJ7Y/
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-14T19:35:47Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AW7HNFGYP44RT3DUDQXG2QT3OEV2PJ7Y/
12
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KOYASTZDGQG2BWLSNBPL3TQRL2G7QYNZ
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KOYASTZDGQG2BWLSNBPL3TQRL2G7QYNZ
13
reference_url https://security.gentoo.org/glsa/202309-08
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-14T19:35:47Z/
url https://security.gentoo.org/glsa/202309-08
14
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1036693
reference_id 1036693
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1036693
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2209469
reference_id 2209469
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2209469
16
reference_url https://nvd.nist.gov/vuln/detail/CVE-2023-32681
reference_id CVE-2023-32681
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2023-32681
17
reference_url https://github.com/advisories/GHSA-j8r2-6x86-q33q
reference_id GHSA-j8r2-6x86-q33q
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-j8r2-6x86-q33q
18
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KOYASTZDGQG2BWLSNBPL3TQRL2G7QYNZ/
reference_id KOYASTZDGQG2BWLSNBPL3TQRL2G7QYNZ
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-14T19:35:47Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KOYASTZDGQG2BWLSNBPL3TQRL2G7QYNZ/
19
reference_url https://access.redhat.com/errata/RHSA-2023:4350
reference_id RHSA-2023:4350
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4350
20
reference_url https://access.redhat.com/errata/RHSA-2023:4520
reference_id RHSA-2023:4520
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4520
21
reference_url https://access.redhat.com/errata/RHSA-2023:4693
reference_id RHSA-2023:4693
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4693
22
reference_url https://access.redhat.com/errata/RHSA-2023:6793
reference_id RHSA-2023:6793
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6793
23
reference_url https://access.redhat.com/errata/RHSA-2023:6818
reference_id RHSA-2023:6818
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6818
24
reference_url https://access.redhat.com/errata/RHSA-2023:7034
reference_id RHSA-2023:7034
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7034
25
reference_url https://access.redhat.com/errata/RHSA-2023:7042
reference_id RHSA-2023:7042
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7042
26
reference_url https://access.redhat.com/errata/RHSA-2023:7050
reference_id RHSA-2023:7050
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7050
27
reference_url https://access.redhat.com/errata/RHSA-2024:0299
reference_id RHSA-2024:0299
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0299
28
reference_url https://usn.ubuntu.com/6155-1/
reference_id USN-6155-1
reference_type
scores
url https://usn.ubuntu.com/6155-1/
29
reference_url https://usn.ubuntu.com/6155-2/
reference_id USN-6155-2
reference_type
scores
url https://usn.ubuntu.com/6155-2/
30
reference_url https://usn.ubuntu.com/7568-1/
reference_id USN-7568-1
reference_type
scores
url https://usn.ubuntu.com/7568-1/
31
reference_url https://usn.ubuntu.com/7762-1/
reference_id USN-7762-1
reference_type
scores
url https://usn.ubuntu.com/7762-1/
fixed_packages
0
url pkg:pypi/requests@2.31.0
purl pkg:pypi/requests@2.31.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-duvn-u125-dqan
1
vulnerability VCID-stx3-z3wu-pbat
resource_url http://public2.vulnerablecode.io/packages/pkg:pypi/requests@2.31.0
aliases CVE-2023-32681, GHSA-j8r2-6x86-q33q, PYSEC-2023-74
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-a3cx-5ju5-27ez
1
url VCID-duvn-u125-dqan
vulnerability_id VCID-duvn-u125-dqan
summary
Requests `Session` object does not verify requests after making first request with verify=False
When using a `requests.Session`, if the first request to a given origin is made with `verify=False`, TLS certificate verification may remain disabled for all subsequent requests to that origin, even if `verify=True` is explicitly specified later.

This occurs because the underlying connection is reused from the session's connection pool, causing the initial TLS verification setting to persist for the lifetime of the pooled connection. As a result, applications may unintentionally send requests without certificate verification, leading to potential man-in-the-middle attacks and compromised confidentiality or integrity.

This behavior affects versions of `requests` prior to 2.32.0.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-35195.json
reference_id
reference_type
scores
0
value 5.6
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-35195.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-35195
reference_id
reference_type
scores
0
value 0.00044
scoring_system epss
scoring_elements 0.1357
published_at 2026-04-13T12:55:00Z
1
value 0.00044
scoring_system epss
scoring_elements 0.13618
published_at 2026-04-12T12:55:00Z
2
value 0.00044
scoring_system epss
scoring_elements 0.13654
published_at 2026-04-11T12:55:00Z
3
value 0.00044
scoring_system epss
scoring_elements 0.13685
published_at 2026-04-09T12:55:00Z
4
value 0.00044
scoring_system epss
scoring_elements 0.13633
published_at 2026-04-08T12:55:00Z
5
value 0.00044
scoring_system epss
scoring_elements 0.13553
published_at 2026-04-07T12:55:00Z
6
value 0.00044
scoring_system epss
scoring_elements 0.13752
published_at 2026-04-04T12:55:00Z
7
value 0.00044
scoring_system epss
scoring_elements 0.13691
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-35195
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35195
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35195
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://github.com/psf/requests
reference_id
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/psf/requests
5
reference_url https://github.com/psf/requests/commit/a58d7f2ffb4d00b46dca2d70a3932a0b37e22fac
reference_id
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-21T14:17:58Z/
url https://github.com/psf/requests/commit/a58d7f2ffb4d00b46dca2d70a3932a0b37e22fac
6
reference_url https://github.com/psf/requests/pull/6655
reference_id
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-21T14:17:58Z/
url https://github.com/psf/requests/pull/6655
7
reference_url https://github.com/psf/requests/security/advisories/GHSA-9wx4-h78v-vm56
reference_id
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:N
1
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-21T14:17:58Z/
url https://github.com/psf/requests/security/advisories/GHSA-9wx4-h78v-vm56
8
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IYLSNK5TL46Q6XPRVMHVWS63MVJQOK4Q
reference_id
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IYLSNK5TL46Q6XPRVMHVWS63MVJQOK4Q
9
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N7WP6EYDSUOCOJYHDK5NX43PYZ4SNHGZ
reference_id
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N7WP6EYDSUOCOJYHDK5NX43PYZ4SNHGZ
10
reference_url https://nvd.nist.gov/vuln/detail/CVE-2024-35195
reference_id
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2024-35195
11
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1071593
reference_id 1071593
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1071593
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2282114
reference_id 2282114
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2282114
13
reference_url https://github.com/advisories/GHSA-9wx4-h78v-vm56
reference_id GHSA-9wx4-h78v-vm56
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-9wx4-h78v-vm56
14
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IYLSNK5TL46Q6XPRVMHVWS63MVJQOK4Q/
reference_id IYLSNK5TL46Q6XPRVMHVWS63MVJQOK4Q
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-21T14:17:58Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IYLSNK5TL46Q6XPRVMHVWS63MVJQOK4Q/
15
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N7WP6EYDSUOCOJYHDK5NX43PYZ4SNHGZ/
reference_id N7WP6EYDSUOCOJYHDK5NX43PYZ4SNHGZ
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-21T14:17:58Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N7WP6EYDSUOCOJYHDK5NX43PYZ4SNHGZ/
16
reference_url https://access.redhat.com/errata/RHSA-2024:3781
reference_id RHSA-2024:3781
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3781
17
reference_url https://access.redhat.com/errata/RHSA-2024:4522
reference_id RHSA-2024:4522
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4522
18
reference_url https://access.redhat.com/errata/RHSA-2024:9988
reference_id RHSA-2024:9988
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9988
19
reference_url https://access.redhat.com/errata/RHSA-2025:0012
reference_id RHSA-2025:0012
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0012
20
reference_url https://access.redhat.com/errata/RHSA-2025:1335
reference_id RHSA-2025:1335
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:1335
21
reference_url https://access.redhat.com/errata/RHSA-2025:2399
reference_id RHSA-2025:2399
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:2399
22
reference_url https://access.redhat.com/errata/RHSA-2025:7049
reference_id RHSA-2025:7049
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:7049
23
reference_url https://access.redhat.com/errata/RHSA-2025:8385
reference_id RHSA-2025:8385
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:8385
fixed_packages
0
url pkg:pypi/requests@2.32.0
purl pkg:pypi/requests@2.32.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-stx3-z3wu-pbat
resource_url http://public2.vulnerablecode.io/packages/pkg:pypi/requests@2.32.0
aliases CVE-2024-35195, GHSA-9wx4-h78v-vm56
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-duvn-u125-dqan
2
url VCID-pd4x-3cee-t7g3
vulnerability_id VCID-pd4x-3cee-t7g3
summary The Requests package before 2.20.0 for Python sends an HTTP Authorization header to an http URI upon receiving a same-hostname https-to-http redirect, which makes it easier for remote attackers to discover credentials by sniffing the network.
references
0
reference_url http://docs.python-requests.org/en/master/community/updates/#release-and-version-history
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url http://docs.python-requests.org/en/master/community/updates/#release-and-version-history
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00024.html
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00024.html
2
reference_url https://access.redhat.com/errata/RHSA-2019:2035
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2019:2035
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-18074.json
reference_id
reference_type
scores
0
value 2.6
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-18074.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-18074
reference_id
reference_type
scores
0
value 0.00243
scoring_system epss
scoring_elements 0.47512
published_at 2026-04-08T12:55:00Z
1
value 0.00243
scoring_system epss
scoring_elements 0.47573
published_at 2026-04-16T12:55:00Z
2
value 0.00243
scoring_system epss
scoring_elements 0.47514
published_at 2026-04-13T12:55:00Z
3
value 0.00243
scoring_system epss
scoring_elements 0.47507
published_at 2026-04-12T12:55:00Z
4
value 0.00243
scoring_system epss
scoring_elements 0.47531
published_at 2026-04-11T12:55:00Z
5
value 0.00243
scoring_system epss
scoring_elements 0.47456
published_at 2026-04-01T12:55:00Z
6
value 0.00243
scoring_system epss
scoring_elements 0.47487
published_at 2026-04-02T12:55:00Z
7
value 0.00243
scoring_system epss
scoring_elements 0.47508
published_at 2026-04-09T12:55:00Z
8
value 0.00243
scoring_system epss
scoring_elements 0.47457
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-18074
5
reference_url https://bugs.debian.org/910766
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://bugs.debian.org/910766
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18074
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18074
7
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
8
reference_url https://github.com/advisories/GHSA-x84v-xcm2-53pg
reference_id
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-x84v-xcm2-53pg
9
reference_url https://github.com/pypa/advisory-database/tree/main/vulns/requests/PYSEC-2018-28.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/pypa/advisory-database/tree/main/vulns/requests/PYSEC-2018-28.yaml
10
reference_url https://github.com/requests/requests
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/requests/requests
11
reference_url https://github.com/requests/requests/commit/c45d7c49ea75133e52ab22a8e9e13173938e36ff
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/requests/requests/commit/c45d7c49ea75133e52ab22a8e9e13173938e36ff
12
reference_url https://github.com/requests/requests/issues/4716
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/requests/requests/issues/4716
13
reference_url https://github.com/requests/requests/pull/4718
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/requests/requests/pull/4718
14
reference_url https://usn.ubuntu.com/3790-1
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://usn.ubuntu.com/3790-1
15
reference_url https://usn.ubuntu.com/3790-1/
reference_id
reference_type
scores
url https://usn.ubuntu.com/3790-1/
16
reference_url https://usn.ubuntu.com/3790-2
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://usn.ubuntu.com/3790-2
17
reference_url https://usn.ubuntu.com/3790-2/
reference_id
reference_type
scores
url https://usn.ubuntu.com/3790-2/
18
reference_url https://www.oracle.com/security-alerts/cpujul2022.html
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://www.oracle.com/security-alerts/cpujul2022.html
19
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1643829
reference_id 1643829
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1643829
20
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=910766
reference_id 910766
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=910766
21
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-18074
reference_id CVE-2018-18074
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2018-18074
22
reference_url https://access.redhat.com/errata/RHSA-2020:0850
reference_id RHSA-2020:0850
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0850
23
reference_url https://access.redhat.com/errata/RHSA-2020:0851
reference_id RHSA-2020:0851
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0851
24
reference_url https://access.redhat.com/errata/RHSA-2020:1605
reference_id RHSA-2020:1605
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1605
25
reference_url https://access.redhat.com/errata/RHSA-2020:1916
reference_id RHSA-2020:1916
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1916
26
reference_url https://access.redhat.com/errata/RHSA-2020:2068
reference_id RHSA-2020:2068
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2068
27
reference_url https://access.redhat.com/errata/RHSA-2020:2081
reference_id RHSA-2020:2081
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2081
fixed_packages
0
url pkg:pypi/requests@2.20.0
purl pkg:pypi/requests@2.20.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-a3cx-5ju5-27ez
1
vulnerability VCID-duvn-u125-dqan
2
vulnerability VCID-stx3-z3wu-pbat
resource_url http://public2.vulnerablecode.io/packages/pkg:pypi/requests@2.20.0
aliases CVE-2018-18074, GHSA-x84v-xcm2-53pg, PYSEC-2018-28
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pd4x-3cee-t7g3
3
url VCID-stx3-z3wu-pbat
vulnerability_id VCID-stx3-z3wu-pbat
summary
Requests vulnerable to .netrc credentials leak via malicious URLs
### Impact

Due to a URL parsing issue, Requests releases prior to 2.32.4 may leak .netrc credentials to third parties for specific maliciously-crafted URLs.

### Workarounds
For older versions of Requests, use of the .netrc file can be disabled with `trust_env=False` on your Requests Session ([docs](https://requests.readthedocs.io/en/latest/api/#requests.Session.trust_env)).

### References
https://github.com/psf/requests/pull/6965
https://seclists.org/fulldisclosure/2025/Jun/2
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47081.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47081.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-47081
reference_id
reference_type
scores
0
value 0.0007
scoring_system epss
scoring_elements 0.2163
published_at 2026-04-02T12:55:00Z
1
value 0.0007
scoring_system epss
scoring_elements 0.21688
published_at 2026-04-04T12:55:00Z
2
value 0.00208
scoring_system epss
scoring_elements 0.4327
published_at 2026-04-11T12:55:00Z
3
value 0.00208
scoring_system epss
scoring_elements 0.43248
published_at 2026-04-09T12:55:00Z
4
value 0.00208
scoring_system epss
scoring_elements 0.43236
published_at 2026-04-08T12:55:00Z
5
value 0.00208
scoring_system epss
scoring_elements 0.43222
published_at 2026-04-13T12:55:00Z
6
value 0.00208
scoring_system epss
scoring_elements 0.43185
published_at 2026-04-07T12:55:00Z
7
value 0.00208
scoring_system epss
scoring_elements 0.43238
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-47081
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47081
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47081
3
reference_url http://seclists.org/fulldisclosure/2025/Jun/2
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url http://seclists.org/fulldisclosure/2025/Jun/2
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://github.com/psf/requests
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/psf/requests
6
reference_url https://github.com/psf/requests/commit/96ba401c1296ab1dda74a2365ef36d88f7d144ef
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T18:39:03Z/
url https://github.com/psf/requests/commit/96ba401c1296ab1dda74a2365ef36d88f7d144ef
7
reference_url https://github.com/psf/requests/pull/6965
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T18:39:03Z/
url https://github.com/psf/requests/pull/6965
8
reference_url https://github.com/psf/requests/security/advisories/GHSA-9hjg-9r4m-mvj7
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T18:39:03Z/
url https://github.com/psf/requests/security/advisories/GHSA-9hjg-9r4m-mvj7
9
reference_url https://nvd.nist.gov/vuln/detail/CVE-2024-47081
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2024-47081
10
reference_url https://requests.readthedocs.io/en/latest/api/#requests.Session.trust_env
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T18:39:03Z/
url https://requests.readthedocs.io/en/latest/api/#requests.Session.trust_env
11
reference_url https://seclists.org/fulldisclosure/2025/Jun/2
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T18:39:03Z/
url https://seclists.org/fulldisclosure/2025/Jun/2
12
reference_url http://www.openwall.com/lists/oss-security/2025/06/03/11
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2025/06/03/11
13
reference_url http://www.openwall.com/lists/oss-security/2025/06/03/9
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2025/06/03/9
14
reference_url http://www.openwall.com/lists/oss-security/2025/06/04/1
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2025/06/04/1
15
reference_url http://www.openwall.com/lists/oss-security/2025/06/04/6
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2025/06/04/6
16
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1107368
reference_id 1107368
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1107368
17
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2371272
reference_id 2371272
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2371272
18
reference_url https://github.com/advisories/GHSA-9hjg-9r4m-mvj7
reference_id GHSA-9hjg-9r4m-mvj7
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-9hjg-9r4m-mvj7
19
reference_url https://access.redhat.com/errata/RHSA-2025:12519
reference_id RHSA-2025:12519
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:12519
20
reference_url https://access.redhat.com/errata/RHSA-2025:13234
reference_id RHSA-2025:13234
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:13234
21
reference_url https://access.redhat.com/errata/RHSA-2025:13604
reference_id RHSA-2025:13604
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:13604
22
reference_url https://access.redhat.com/errata/RHSA-2025:14750
reference_id RHSA-2025:14750
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14750
23
reference_url https://access.redhat.com/errata/RHSA-2025:14999
reference_id RHSA-2025:14999
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14999
24
reference_url https://access.redhat.com/errata/RHSA-2025:15121
reference_id RHSA-2025:15121
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:15121
25
reference_url https://access.redhat.com/errata/RHSA-2025:15122
reference_id RHSA-2025:15122
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:15122
26
reference_url https://access.redhat.com/errata/RHSA-2025:15614
reference_id RHSA-2025:15614
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:15614
27
reference_url https://access.redhat.com/errata/RHSA-2025:15615
reference_id RHSA-2025:15615
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:15615
28
reference_url https://access.redhat.com/errata/RHSA-2025:15616
reference_id RHSA-2025:15616
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:15616
29
reference_url https://access.redhat.com/errata/RHSA-2025:15617
reference_id RHSA-2025:15617
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:15617
30
reference_url https://access.redhat.com/errata/RHSA-2025:15618
reference_id RHSA-2025:15618
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:15618
31
reference_url https://access.redhat.com/errata/RHSA-2025:15622
reference_id RHSA-2025:15622
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:15622
32
reference_url https://access.redhat.com/errata/RHSA-2025:15691
reference_id RHSA-2025:15691
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:15691
33
reference_url https://access.redhat.com/errata/RHSA-2025:15723
reference_id RHSA-2025:15723
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:15723
34
reference_url https://access.redhat.com/errata/RHSA-2026:4215
reference_id RHSA-2026:4215
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4215
35
reference_url https://usn.ubuntu.com/7568-1/
reference_id USN-7568-1
reference_type
scores
url https://usn.ubuntu.com/7568-1/
36
reference_url https://usn.ubuntu.com/7762-1/
reference_id USN-7762-1
reference_type
scores
url https://usn.ubuntu.com/7762-1/
fixed_packages
0
url pkg:pypi/requests@2.32.4
purl pkg:pypi/requests@2.32.4
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:pypi/requests@2.32.4
aliases CVE-2024-47081, GHSA-9hjg-9r4m-mvj7
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-stx3-z3wu-pbat
Fixing_vulnerabilities
Risk_score4.0
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:pypi/requests@2.16.0