Search for vulnerabilities
Vulnerability details: VCID-3nqp-s5gu-aaae
Vulnerability ID VCID-3nqp-s5gu-aaae
Aliases CVE-2023-32681
GHSA-j8r2-6x86-q33q
PYSEC-2023-74
Summary Unintended leak of Proxy-Authorization header in requests
Status Published
Exploitability 0.5
Weighted Severity 6.2
Risk 3.1
Affected and Fixed Packages Package Details
Weaknesses (4)
System Score Found at
cvssv3.1 5.4 https://access.redhat.com/errata/RHSA-2023:6818
ssvc Track https://access.redhat.com/errata/RHSA-2023:6818
cvssv3 6.1 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-32681.json
epss 0.00270 https://api.first.org/data/v1/epss?cve=CVE-2023-32681
epss 0.00306 https://api.first.org/data/v1/epss?cve=CVE-2023-32681
epss 0.00306 https://api.first.org/data/v1/epss?cve=CVE-2023-32681
epss 0.00306 https://api.first.org/data/v1/epss?cve=CVE-2023-32681
epss 0.00306 https://api.first.org/data/v1/epss?cve=CVE-2023-32681
epss 0.00317 https://api.first.org/data/v1/epss?cve=CVE-2023-32681
epss 0.00317 https://api.first.org/data/v1/epss?cve=CVE-2023-32681
epss 0.00317 https://api.first.org/data/v1/epss?cve=CVE-2023-32681
epss 0.00317 https://api.first.org/data/v1/epss?cve=CVE-2023-32681
epss 0.00317 https://api.first.org/data/v1/epss?cve=CVE-2023-32681
epss 0.00317 https://api.first.org/data/v1/epss?cve=CVE-2023-32681
epss 0.00317 https://api.first.org/data/v1/epss?cve=CVE-2023-32681
epss 0.00317 https://api.first.org/data/v1/epss?cve=CVE-2023-32681
epss 0.00317 https://api.first.org/data/v1/epss?cve=CVE-2023-32681
epss 0.00317 https://api.first.org/data/v1/epss?cve=CVE-2023-32681
epss 0.00317 https://api.first.org/data/v1/epss?cve=CVE-2023-32681
epss 0.04611 https://api.first.org/data/v1/epss?cve=CVE-2023-32681
epss 0.04611 https://api.first.org/data/v1/epss?cve=CVE-2023-32681
epss 0.04611 https://api.first.org/data/v1/epss?cve=CVE-2023-32681
epss 0.04611 https://api.first.org/data/v1/epss?cve=CVE-2023-32681
epss 0.04611 https://api.first.org/data/v1/epss?cve=CVE-2023-32681
epss 0.04611 https://api.first.org/data/v1/epss?cve=CVE-2023-32681
epss 0.04611 https://api.first.org/data/v1/epss?cve=CVE-2023-32681
epss 0.04611 https://api.first.org/data/v1/epss?cve=CVE-2023-32681
epss 0.04611 https://api.first.org/data/v1/epss?cve=CVE-2023-32681
epss 0.04611 https://api.first.org/data/v1/epss?cve=CVE-2023-32681
epss 0.04611 https://api.first.org/data/v1/epss?cve=CVE-2023-32681
epss 0.04611 https://api.first.org/data/v1/epss?cve=CVE-2023-32681
epss 0.04611 https://api.first.org/data/v1/epss?cve=CVE-2023-32681
epss 0.04611 https://api.first.org/data/v1/epss?cve=CVE-2023-32681
epss 0.04611 https://api.first.org/data/v1/epss?cve=CVE-2023-32681
epss 0.04611 https://api.first.org/data/v1/epss?cve=CVE-2023-32681
epss 0.04611 https://api.first.org/data/v1/epss?cve=CVE-2023-32681
epss 0.04611 https://api.first.org/data/v1/epss?cve=CVE-2023-32681
epss 0.04731 https://api.first.org/data/v1/epss?cve=CVE-2023-32681
epss 0.04731 https://api.first.org/data/v1/epss?cve=CVE-2023-32681
epss 0.04731 https://api.first.org/data/v1/epss?cve=CVE-2023-32681
epss 0.04731 https://api.first.org/data/v1/epss?cve=CVE-2023-32681
epss 0.04731 https://api.first.org/data/v1/epss?cve=CVE-2023-32681
epss 0.04731 https://api.first.org/data/v1/epss?cve=CVE-2023-32681
epss 0.04731 https://api.first.org/data/v1/epss?cve=CVE-2023-32681
epss 0.04731 https://api.first.org/data/v1/epss?cve=CVE-2023-32681
epss 0.04732 https://api.first.org/data/v1/epss?cve=CVE-2023-32681
epss 0.04732 https://api.first.org/data/v1/epss?cve=CVE-2023-32681
epss 0.04732 https://api.first.org/data/v1/epss?cve=CVE-2023-32681
epss 0.04732 https://api.first.org/data/v1/epss?cve=CVE-2023-32681
epss 0.04732 https://api.first.org/data/v1/epss?cve=CVE-2023-32681
epss 0.04732 https://api.first.org/data/v1/epss?cve=CVE-2023-32681
epss 0.04732 https://api.first.org/data/v1/epss?cve=CVE-2023-32681
epss 0.04732 https://api.first.org/data/v1/epss?cve=CVE-2023-32681
epss 0.04732 https://api.first.org/data/v1/epss?cve=CVE-2023-32681
epss 0.04732 https://api.first.org/data/v1/epss?cve=CVE-2023-32681
epss 0.04732 https://api.first.org/data/v1/epss?cve=CVE-2023-32681
epss 0.04732 https://api.first.org/data/v1/epss?cve=CVE-2023-32681
epss 0.04732 https://api.first.org/data/v1/epss?cve=CVE-2023-32681
epss 0.04732 https://api.first.org/data/v1/epss?cve=CVE-2023-32681
epss 0.04732 https://api.first.org/data/v1/epss?cve=CVE-2023-32681
epss 0.04732 https://api.first.org/data/v1/epss?cve=CVE-2023-32681
epss 0.04732 https://api.first.org/data/v1/epss?cve=CVE-2023-32681
epss 0.04732 https://api.first.org/data/v1/epss?cve=CVE-2023-32681
epss 0.04732 https://api.first.org/data/v1/epss?cve=CVE-2023-32681
epss 0.04732 https://api.first.org/data/v1/epss?cve=CVE-2023-32681
epss 0.04732 https://api.first.org/data/v1/epss?cve=CVE-2023-32681
epss 0.04732 https://api.first.org/data/v1/epss?cve=CVE-2023-32681
epss 0.04732 https://api.first.org/data/v1/epss?cve=CVE-2023-32681
epss 0.04732 https://api.first.org/data/v1/epss?cve=CVE-2023-32681
epss 0.06121 https://api.first.org/data/v1/epss?cve=CVE-2023-32681
epss 0.06278 https://api.first.org/data/v1/epss?cve=CVE-2023-32681
epss 0.06278 https://api.first.org/data/v1/epss?cve=CVE-2023-32681
epss 0.06278 https://api.first.org/data/v1/epss?cve=CVE-2023-32681
epss 0.06278 https://api.first.org/data/v1/epss?cve=CVE-2023-32681
epss 0.08044 https://api.first.org/data/v1/epss?cve=CVE-2023-32681
epss 0.08044 https://api.first.org/data/v1/epss?cve=CVE-2023-32681
epss 0.08044 https://api.first.org/data/v1/epss?cve=CVE-2023-32681
epss 0.09817 https://api.first.org/data/v1/epss?cve=CVE-2023-32681
epss 0.09817 https://api.first.org/data/v1/epss?cve=CVE-2023-32681
epss 0.09817 https://api.first.org/data/v1/epss?cve=CVE-2023-32681
epss 0.09817 https://api.first.org/data/v1/epss?cve=CVE-2023-32681
epss 0.09817 https://api.first.org/data/v1/epss?cve=CVE-2023-32681
epss 0.09817 https://api.first.org/data/v1/epss?cve=CVE-2023-32681
epss 0.09817 https://api.first.org/data/v1/epss?cve=CVE-2023-32681
epss 0.09817 https://api.first.org/data/v1/epss?cve=CVE-2023-32681
epss 0.09817 https://api.first.org/data/v1/epss?cve=CVE-2023-32681
epss 0.09817 https://api.first.org/data/v1/epss?cve=CVE-2023-32681
epss 0.2659 https://api.first.org/data/v1/epss?cve=CVE-2023-32681
cvssv3.1 6.1 https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
cvssv3.1_qr MODERATE https://github.com/advisories/GHSA-j8r2-6x86-q33q
cvssv3.1 5.6 https://github.com/psf/requests
generic_textual MODERATE https://github.com/psf/requests
cvssv3.1 6.1 https://github.com/psf/requests/commit/74ea7cf7a6a27a4eeb2ae24e162bcc942a6706d5
generic_textual MODERATE https://github.com/psf/requests/commit/74ea7cf7a6a27a4eeb2ae24e162bcc942a6706d5
ssvc Track https://github.com/psf/requests/commit/74ea7cf7a6a27a4eeb2ae24e162bcc942a6706d5
cvssv3.1 6.1 https://github.com/psf/requests/releases/tag/v2.31.0
generic_textual MODERATE https://github.com/psf/requests/releases/tag/v2.31.0
ssvc Track https://github.com/psf/requests/releases/tag/v2.31.0
cvssv3.1 6.1 https://github.com/psf/requests/security/advisories/GHSA-j8r2-6x86-q33q
cvssv3.1_qr MODERATE https://github.com/psf/requests/security/advisories/GHSA-j8r2-6x86-q33q
ssvc Track https://github.com/psf/requests/security/advisories/GHSA-j8r2-6x86-q33q
cvssv3.1 6.1 https://github.com/pypa/advisory-database/tree/main/vulns/requests/PYSEC-2023-74.yaml
generic_textual MODERATE https://github.com/pypa/advisory-database/tree/main/vulns/requests/PYSEC-2023-74.yaml
cvssv3.1 6.1 https://lists.debian.org/debian-lts-announce/2023/06/msg00018.html
generic_textual MODERATE https://lists.debian.org/debian-lts-announce/2023/06/msg00018.html
ssvc Track https://lists.debian.org/debian-lts-announce/2023/06/msg00018.html
cvssv3.1 6.1 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AW7HNFGYP44RT3DUDQXG2QT3OEV2PJ7Y
generic_textual MODERATE https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AW7HNFGYP44RT3DUDQXG2QT3OEV2PJ7Y
cvssv3.1 6.1 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AW7HNFGYP44RT3DUDQXG2QT3OEV2PJ7Y/
ssvc Track https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AW7HNFGYP44RT3DUDQXG2QT3OEV2PJ7Y/
cvssv3.1 6.1 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KOYASTZDGQG2BWLSNBPL3TQRL2G7QYNZ
generic_textual MODERATE https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KOYASTZDGQG2BWLSNBPL3TQRL2G7QYNZ
cvssv3.1 6.1 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KOYASTZDGQG2BWLSNBPL3TQRL2G7QYNZ/
ssvc Track https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KOYASTZDGQG2BWLSNBPL3TQRL2G7QYNZ/
cvssv3 6.1 https://nvd.nist.gov/vuln/detail/CVE-2023-32681
cvssv3.1 6.1 https://nvd.nist.gov/vuln/detail/CVE-2023-32681
cvssv3.1 6.1 https://security.gentoo.org/glsa/202309-08
generic_textual MODERATE https://security.gentoo.org/glsa/202309-08
ssvc Track https://security.gentoo.org/glsa/202309-08
Reference id Reference type URL
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-32681.json
https://api.first.org/data/v1/epss?cve=CVE-2023-32681
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32681
https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
https://github.com/psf/requests
https://github.com/psf/requests/commit/74ea7cf7a6a27a4eeb2ae24e162bcc942a6706d5
https://github.com/psf/requests/releases/tag/v2.31.0
https://github.com/pypa/advisory-database/tree/main/vulns/requests/PYSEC-2023-74.yaml
https://lists.debian.org/debian-lts-announce/2023/06/msg00018.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AW7HNFGYP44RT3DUDQXG2QT3OEV2PJ7Y
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AW7HNFGYP44RT3DUDQXG2QT3OEV2PJ7Y/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KOYASTZDGQG2BWLSNBPL3TQRL2G7QYNZ
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KOYASTZDGQG2BWLSNBPL3TQRL2G7QYNZ/
https://security.gentoo.org/glsa/202309-08
1036693 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1036693
2209469 https://bugzilla.redhat.com/show_bug.cgi?id=2209469
cpe:2.3:a:python:requests:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:python:requests:*:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*
CVE-2023-32681 https://nvd.nist.gov/vuln/detail/CVE-2023-32681
GHSA-j8r2-6x86-q33q https://github.com/advisories/GHSA-j8r2-6x86-q33q
GHSA-j8r2-6x86-q33q https://github.com/psf/requests/security/advisories/GHSA-j8r2-6x86-q33q
RHSA-2023:4350 https://access.redhat.com/errata/RHSA-2023:4350
RHSA-2023:4520 https://access.redhat.com/errata/RHSA-2023:4520
RHSA-2023:4693 https://access.redhat.com/errata/RHSA-2023:4693
RHSA-2023:6793 https://access.redhat.com/errata/RHSA-2023:6793
RHSA-2023:6818 https://access.redhat.com/errata/RHSA-2023:6818
RHSA-2023:7034 https://access.redhat.com/errata/RHSA-2023:7034
RHSA-2023:7042 https://access.redhat.com/errata/RHSA-2023:7042
RHSA-2023:7050 https://access.redhat.com/errata/RHSA-2023:7050
RHSA-2024:0299 https://access.redhat.com/errata/RHSA-2024:0299
USN-6155-1 https://usn.ubuntu.com/6155-1/
USN-6155-2 https://usn.ubuntu.com/6155-2/
USN-7568-1 https://usn.ubuntu.com/7568-1/
No exploits are available.
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N Found at https://access.redhat.com/errata/RHSA-2023:6818
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-11T19:42:07Z/ Found at https://access.redhat.com/errata/RHSA-2023:6818
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-32681.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N Found at https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:N Found at https://github.com/psf/requests
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N Found at https://github.com/psf/requests/commit/74ea7cf7a6a27a4eeb2ae24e162bcc942a6706d5
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-14T19:35:47Z/ Found at https://github.com/psf/requests/commit/74ea7cf7a6a27a4eeb2ae24e162bcc942a6706d5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N Found at https://github.com/psf/requests/releases/tag/v2.31.0
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-14T19:35:47Z/ Found at https://github.com/psf/requests/releases/tag/v2.31.0
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N Found at https://github.com/psf/requests/security/advisories/GHSA-j8r2-6x86-q33q
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-14T19:35:47Z/ Found at https://github.com/psf/requests/security/advisories/GHSA-j8r2-6x86-q33q
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N Found at https://github.com/pypa/advisory-database/tree/main/vulns/requests/PYSEC-2023-74.yaml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N Found at https://lists.debian.org/debian-lts-announce/2023/06/msg00018.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-14T19:35:47Z/ Found at https://lists.debian.org/debian-lts-announce/2023/06/msg00018.html
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N Found at https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AW7HNFGYP44RT3DUDQXG2QT3OEV2PJ7Y
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N Found at https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AW7HNFGYP44RT3DUDQXG2QT3OEV2PJ7Y/
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-14T19:35:47Z/ Found at https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AW7HNFGYP44RT3DUDQXG2QT3OEV2PJ7Y/
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N Found at https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KOYASTZDGQG2BWLSNBPL3TQRL2G7QYNZ
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N Found at https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KOYASTZDGQG2BWLSNBPL3TQRL2G7QYNZ/
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-14T19:35:47Z/ Found at https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KOYASTZDGQG2BWLSNBPL3TQRL2G7QYNZ/
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N Found at https://nvd.nist.gov/vuln/detail/CVE-2023-32681
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N Found at https://nvd.nist.gov/vuln/detail/CVE-2023-32681
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N Found at https://security.gentoo.org/glsa/202309-08
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-14T19:35:47Z/ Found at https://security.gentoo.org/glsa/202309-08
Exploit Prediction Scoring System (EPSS)
Percentile 0.68340
EPSS Score 0.00270
Published At Nov. 1, 2024, midnight
Date Actor Action Source VulnerableCode Version
There are no relevant records.