Search for vulnerabilities
Vulnerability details: VCID-c4sy-7zv4-aaas
Vulnerability ID VCID-c4sy-7zv4-aaas
Aliases CVE-2023-43804
GHSA-v845-jxx5-vc9f
PYSEC-0000-CVE-2023-43804
PYSEC-2023-192
Summary `Cookie` HTTP header isn't stripped on cross-origin redirects
Status Published
Exploitability 0.5
Weighted Severity 8.0
Risk 4.0
Affected and Fixed Packages Package Details
Weaknesses (3)
System Score Found at
cvssv3.1 5 https://access.redhat.com/errata/RHSA-2024:0733
ssvc Track https://access.redhat.com/errata/RHSA-2024:0733
cvssv3 5.9 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-43804.json
epss 0.00114 https://api.first.org/data/v1/epss?cve=CVE-2023-43804
epss 0.00114 https://api.first.org/data/v1/epss?cve=CVE-2023-43804
epss 0.00114 https://api.first.org/data/v1/epss?cve=CVE-2023-43804
epss 0.00114 https://api.first.org/data/v1/epss?cve=CVE-2023-43804
epss 0.00114 https://api.first.org/data/v1/epss?cve=CVE-2023-43804
epss 0.00114 https://api.first.org/data/v1/epss?cve=CVE-2023-43804
epss 0.00114 https://api.first.org/data/v1/epss?cve=CVE-2023-43804
epss 0.00114 https://api.first.org/data/v1/epss?cve=CVE-2023-43804
epss 0.00114 https://api.first.org/data/v1/epss?cve=CVE-2023-43804
epss 0.00114 https://api.first.org/data/v1/epss?cve=CVE-2023-43804
epss 0.00114 https://api.first.org/data/v1/epss?cve=CVE-2023-43804
epss 0.00114 https://api.first.org/data/v1/epss?cve=CVE-2023-43804
epss 0.00233 https://api.first.org/data/v1/epss?cve=CVE-2023-43804
epss 0.00233 https://api.first.org/data/v1/epss?cve=CVE-2023-43804
epss 0.00233 https://api.first.org/data/v1/epss?cve=CVE-2023-43804
epss 0.00247 https://api.first.org/data/v1/epss?cve=CVE-2023-43804
epss 0.00413 https://api.first.org/data/v1/epss?cve=CVE-2023-43804
epss 0.00424 https://api.first.org/data/v1/epss?cve=CVE-2023-43804
epss 0.00424 https://api.first.org/data/v1/epss?cve=CVE-2023-43804
epss 0.00424 https://api.first.org/data/v1/epss?cve=CVE-2023-43804
epss 0.00424 https://api.first.org/data/v1/epss?cve=CVE-2023-43804
epss 0.00424 https://api.first.org/data/v1/epss?cve=CVE-2023-43804
epss 0.00424 https://api.first.org/data/v1/epss?cve=CVE-2023-43804
epss 0.00424 https://api.first.org/data/v1/epss?cve=CVE-2023-43804
epss 0.00424 https://api.first.org/data/v1/epss?cve=CVE-2023-43804
epss 0.00554 https://api.first.org/data/v1/epss?cve=CVE-2023-43804
epss 0.00554 https://api.first.org/data/v1/epss?cve=CVE-2023-43804
epss 0.00554 https://api.first.org/data/v1/epss?cve=CVE-2023-43804
epss 0.00554 https://api.first.org/data/v1/epss?cve=CVE-2023-43804
epss 0.00554 https://api.first.org/data/v1/epss?cve=CVE-2023-43804
epss 0.00554 https://api.first.org/data/v1/epss?cve=CVE-2023-43804
epss 0.00554 https://api.first.org/data/v1/epss?cve=CVE-2023-43804
epss 0.00554 https://api.first.org/data/v1/epss?cve=CVE-2023-43804
epss 0.00554 https://api.first.org/data/v1/epss?cve=CVE-2023-43804
epss 0.00554 https://api.first.org/data/v1/epss?cve=CVE-2023-43804
epss 0.00554 https://api.first.org/data/v1/epss?cve=CVE-2023-43804
epss 0.00554 https://api.first.org/data/v1/epss?cve=CVE-2023-43804
epss 0.00554 https://api.first.org/data/v1/epss?cve=CVE-2023-43804
epss 0.00554 https://api.first.org/data/v1/epss?cve=CVE-2023-43804
epss 0.00554 https://api.first.org/data/v1/epss?cve=CVE-2023-43804
epss 0.00554 https://api.first.org/data/v1/epss?cve=CVE-2023-43804
epss 0.00554 https://api.first.org/data/v1/epss?cve=CVE-2023-43804
epss 0.00554 https://api.first.org/data/v1/epss?cve=CVE-2023-43804
epss 0.00554 https://api.first.org/data/v1/epss?cve=CVE-2023-43804
epss 0.00554 https://api.first.org/data/v1/epss?cve=CVE-2023-43804
epss 0.00554 https://api.first.org/data/v1/epss?cve=CVE-2023-43804
epss 0.00554 https://api.first.org/data/v1/epss?cve=CVE-2023-43804
epss 0.00554 https://api.first.org/data/v1/epss?cve=CVE-2023-43804
epss 0.00554 https://api.first.org/data/v1/epss?cve=CVE-2023-43804
epss 0.00554 https://api.first.org/data/v1/epss?cve=CVE-2023-43804
epss 0.00554 https://api.first.org/data/v1/epss?cve=CVE-2023-43804
epss 0.00554 https://api.first.org/data/v1/epss?cve=CVE-2023-43804
epss 0.00554 https://api.first.org/data/v1/epss?cve=CVE-2023-43804
epss 0.00554 https://api.first.org/data/v1/epss?cve=CVE-2023-43804
epss 0.00554 https://api.first.org/data/v1/epss?cve=CVE-2023-43804
epss 0.00554 https://api.first.org/data/v1/epss?cve=CVE-2023-43804
epss 0.00554 https://api.first.org/data/v1/epss?cve=CVE-2023-43804
epss 0.00554 https://api.first.org/data/v1/epss?cve=CVE-2023-43804
epss 0.00554 https://api.first.org/data/v1/epss?cve=CVE-2023-43804
epss 0.00554 https://api.first.org/data/v1/epss?cve=CVE-2023-43804
epss 0.00554 https://api.first.org/data/v1/epss?cve=CVE-2023-43804
epss 0.00554 https://api.first.org/data/v1/epss?cve=CVE-2023-43804
epss 0.00554 https://api.first.org/data/v1/epss?cve=CVE-2023-43804
epss 0.00554 https://api.first.org/data/v1/epss?cve=CVE-2023-43804
epss 0.00554 https://api.first.org/data/v1/epss?cve=CVE-2023-43804
epss 0.00554 https://api.first.org/data/v1/epss?cve=CVE-2023-43804
epss 0.00569 https://api.first.org/data/v1/epss?cve=CVE-2023-43804
epss 0.00569 https://api.first.org/data/v1/epss?cve=CVE-2023-43804
epss 0.00569 https://api.first.org/data/v1/epss?cve=CVE-2023-43804
epss 0.00569 https://api.first.org/data/v1/epss?cve=CVE-2023-43804
epss 0.00569 https://api.first.org/data/v1/epss?cve=CVE-2023-43804
epss 0.00569 https://api.first.org/data/v1/epss?cve=CVE-2023-43804
epss 0.00569 https://api.first.org/data/v1/epss?cve=CVE-2023-43804
epss 0.00569 https://api.first.org/data/v1/epss?cve=CVE-2023-43804
epss 0.00569 https://api.first.org/data/v1/epss?cve=CVE-2023-43804
epss 0.00569 https://api.first.org/data/v1/epss?cve=CVE-2023-43804
epss 0.00569 https://api.first.org/data/v1/epss?cve=CVE-2023-43804
epss 0.00569 https://api.first.org/data/v1/epss?cve=CVE-2023-43804
epss 0.00569 https://api.first.org/data/v1/epss?cve=CVE-2023-43804
epss 0.00569 https://api.first.org/data/v1/epss?cve=CVE-2023-43804
epss 0.00569 https://api.first.org/data/v1/epss?cve=CVE-2023-43804
epss 0.00569 https://api.first.org/data/v1/epss?cve=CVE-2023-43804
epss 0.00569 https://api.first.org/data/v1/epss?cve=CVE-2023-43804
epss 0.00569 https://api.first.org/data/v1/epss?cve=CVE-2023-43804
epss 0.00569 https://api.first.org/data/v1/epss?cve=CVE-2023-43804
epss 0.00569 https://api.first.org/data/v1/epss?cve=CVE-2023-43804
epss 0.00569 https://api.first.org/data/v1/epss?cve=CVE-2023-43804
epss 0.00569 https://api.first.org/data/v1/epss?cve=CVE-2023-43804
epss 0.02657 https://api.first.org/data/v1/epss?cve=CVE-2023-43804
cvssv3.1 5.9 https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
cvssv3.1_qr HIGH https://github.com/advisories/GHSA-v845-jxx5-vc9f
cvssv3.1_qr MODERATE https://github.com/advisories/GHSA-v845-jxx5-vc9f
cvssv3.1 5.9 https://github.com/pypa/advisory-database/tree/main/vulns/urllib3/PYSEC-2023-192.yaml
generic_textual HIGH https://github.com/pypa/advisory-database/tree/main/vulns/urllib3/PYSEC-2023-192.yaml
generic_textual MODERATE https://github.com/pypa/advisory-database/tree/main/vulns/urllib3/PYSEC-2023-192.yaml
cvssv3.1 4.4 https://github.com/urllib3/urllib3
cvssv3.1 5.9 https://github.com/urllib3/urllib3
generic_textual HIGH https://github.com/urllib3/urllib3
generic_textual MODERATE https://github.com/urllib3/urllib3
cvssv3.1 5.9 https://github.com/urllib3/urllib3/commit/01220354d389cd05474713f8c982d05c9b17aafb
generic_textual HIGH https://github.com/urllib3/urllib3/commit/01220354d389cd05474713f8c982d05c9b17aafb
generic_textual MODERATE https://github.com/urllib3/urllib3/commit/01220354d389cd05474713f8c982d05c9b17aafb
cvssv3.1 5.9 https://github.com/urllib3/urllib3/commit/644124ecd0b6e417c527191f866daa05a5a2056d
generic_textual HIGH https://github.com/urllib3/urllib3/commit/644124ecd0b6e417c527191f866daa05a5a2056d
generic_textual MODERATE https://github.com/urllib3/urllib3/commit/644124ecd0b6e417c527191f866daa05a5a2056d
cvssv3.1 5.9 https://github.com/urllib3/urllib3/security/advisories/GHSA-v845-jxx5-vc9f
cvssv3.1_qr HIGH https://github.com/urllib3/urllib3/security/advisories/GHSA-v845-jxx5-vc9f
cvssv3.1_qr MODERATE https://github.com/urllib3/urllib3/security/advisories/GHSA-v845-jxx5-vc9f
generic_textual HIGH https://github.com/urllib3/urllib3/security/advisories/GHSA-v845-jxx5-vc9f
cvssv3.1 5.9 https://lists.debian.org/debian-lts-announce/2023/10/msg00012.html
generic_textual HIGH https://lists.debian.org/debian-lts-announce/2023/10/msg00012.html
generic_textual MODERATE https://lists.debian.org/debian-lts-announce/2023/10/msg00012.html
cvssv3.1 4.2 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5F5CUBAN5XMEBVBZPHFITBLMJV5FIJJ5
cvssv3.1 5.9 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5F5CUBAN5XMEBVBZPHFITBLMJV5FIJJ5
generic_textual HIGH https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5F5CUBAN5XMEBVBZPHFITBLMJV5FIJJ5
generic_textual MODERATE https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5F5CUBAN5XMEBVBZPHFITBLMJV5FIJJ5
cvssv3.1 5.9 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I3PR7C6RJ6JUBQKIJ644DMIJSUP36VDY
generic_textual HIGH https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I3PR7C6RJ6JUBQKIJ644DMIJSUP36VDY
generic_textual MODERATE https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I3PR7C6RJ6JUBQKIJ644DMIJSUP36VDY
cvssv3.1 5.9 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NDAGZXYJ7H2G3SB47M453VQVNAWKAEJJ
generic_textual HIGH https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NDAGZXYJ7H2G3SB47M453VQVNAWKAEJJ
generic_textual MODERATE https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NDAGZXYJ7H2G3SB47M453VQVNAWKAEJJ
cvssv3 8.1 https://nvd.nist.gov/vuln/detail/CVE-2023-43804
cvssv3.1 5.9 https://nvd.nist.gov/vuln/detail/CVE-2023-43804
cvssv3.1 8.1 https://nvd.nist.gov/vuln/detail/CVE-2023-43804
generic_textual HIGH https://nvd.nist.gov/vuln/detail/CVE-2023-43804
cvssv3.1 5.9 https://security.netapp.com/advisory/ntap-20241213-0007
generic_textual HIGH https://security.netapp.com/advisory/ntap-20241213-0007
cvssv3.1 5.9 https://www.vicarius.io/vsociety/posts/cve-2023-43804-urllib3-vulnerability-3
generic_textual HIGH https://www.vicarius.io/vsociety/posts/cve-2023-43804-urllib3-vulnerability-3
Reference id Reference type URL
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-43804.json
https://api.first.org/data/v1/epss?cve=CVE-2023-43804
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43804
https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
https://github.com/pypa/advisory-database/tree/main/vulns/urllib3/PYSEC-2023-192.yaml
https://github.com/urllib3/urllib3
https://github.com/urllib3/urllib3/commit/01220354d389cd05474713f8c982d05c9b17aafb
https://github.com/urllib3/urllib3/commit/644124ecd0b6e417c527191f866daa05a5a2056d
https://lists.debian.org/debian-lts-announce/2023/10/msg00012.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5F5CUBAN5XMEBVBZPHFITBLMJV5FIJJ5
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5F5CUBAN5XMEBVBZPHFITBLMJV5FIJJ5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I3PR7C6RJ6JUBQKIJ644DMIJSUP36VDY
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I3PR7C6RJ6JUBQKIJ644DMIJSUP36VDY/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NDAGZXYJ7H2G3SB47M453VQVNAWKAEJJ
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NDAGZXYJ7H2G3SB47M453VQVNAWKAEJJ/
https://security.netapp.com/advisory/ntap-20241213-0007
https://security.netapp.com/advisory/ntap-20241213-0007/
https://www.vicarius.io/vsociety/posts/cve-2023-43804-urllib3-vulnerability-3
1053626 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1053626
2242493 https://bugzilla.redhat.com/show_bug.cgi?id=2242493
cpe:2.3:a:python:urllib3:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:python:urllib3:*:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*
CVE-2023-43804 https://nvd.nist.gov/vuln/detail/CVE-2023-43804
GHSA-v845-jxx5-vc9f https://github.com/advisories/GHSA-v845-jxx5-vc9f
GHSA-v845-jxx5-vc9f https://github.com/urllib3/urllib3/security/advisories/GHSA-v845-jxx5-vc9f
RHSA-2023:6158 https://access.redhat.com/errata/RHSA-2023:6158
RHSA-2023:6812 https://access.redhat.com/errata/RHSA-2023:6812
RHSA-2023:7378 https://access.redhat.com/errata/RHSA-2023:7378
RHSA-2023:7385 https://access.redhat.com/errata/RHSA-2023:7385
RHSA-2023:7407 https://access.redhat.com/errata/RHSA-2023:7407
RHSA-2023:7435 https://access.redhat.com/errata/RHSA-2023:7435
RHSA-2023:7523 https://access.redhat.com/errata/RHSA-2023:7523
RHSA-2023:7528 https://access.redhat.com/errata/RHSA-2023:7528
RHSA-2023:7753 https://access.redhat.com/errata/RHSA-2023:7753
RHSA-2024:0116 https://access.redhat.com/errata/RHSA-2024:0116
RHSA-2024:0133 https://access.redhat.com/errata/RHSA-2024:0133
RHSA-2024:0187 https://access.redhat.com/errata/RHSA-2024:0187
RHSA-2024:0300 https://access.redhat.com/errata/RHSA-2024:0300
RHSA-2024:0464 https://access.redhat.com/errata/RHSA-2024:0464
RHSA-2024:0588 https://access.redhat.com/errata/RHSA-2024:0588
RHSA-2024:0733 https://access.redhat.com/errata/RHSA-2024:0733
RHSA-2024:1383 https://access.redhat.com/errata/RHSA-2024:1383
RHSA-2024:2159 https://access.redhat.com/errata/RHSA-2024:2159
RHSA-2024:2985 https://access.redhat.com/errata/RHSA-2024:2985
RHSA-2024:2986 https://access.redhat.com/errata/RHSA-2024:2986
RHSA-2024:2987 https://access.redhat.com/errata/RHSA-2024:2987
USN-6473-1 https://usn.ubuntu.com/6473-1/
USN-6473-2 https://usn.ubuntu.com/6473-2/
No exploits are available.
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N Found at https://access.redhat.com/errata/RHSA-2024:0733
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-06T18:30:30Z/ Found at https://access.redhat.com/errata/RHSA-2024:0733
Vector: CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-43804.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N Found at https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N Found at https://github.com/pypa/advisory-database/tree/main/vulns/urllib3/PYSEC-2023-192.yaml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N Found at https://github.com/urllib3/urllib3
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N Found at https://github.com/urllib3/urllib3
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N Found at https://github.com/urllib3/urllib3/commit/01220354d389cd05474713f8c982d05c9b17aafb
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N Found at https://github.com/urllib3/urllib3/commit/644124ecd0b6e417c527191f866daa05a5a2056d
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N Found at https://github.com/urllib3/urllib3/security/advisories/GHSA-v845-jxx5-vc9f
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N Found at https://lists.debian.org/debian-lts-announce/2023/10/msg00012.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N Found at https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5F5CUBAN5XMEBVBZPHFITBLMJV5FIJJ5
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N Found at https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5F5CUBAN5XMEBVBZPHFITBLMJV5FIJJ5
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N Found at https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I3PR7C6RJ6JUBQKIJ644DMIJSUP36VDY
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N Found at https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NDAGZXYJ7H2G3SB47M453VQVNAWKAEJJ
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N Found at https://nvd.nist.gov/vuln/detail/CVE-2023-43804
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N Found at https://nvd.nist.gov/vuln/detail/CVE-2023-43804
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N Found at https://nvd.nist.gov/vuln/detail/CVE-2023-43804
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N Found at https://security.netapp.com/advisory/ntap-20241213-0007
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N Found at https://www.vicarius.io/vsociety/posts/cve-2023-43804-urllib3-vulnerability-3
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.46024
EPSS Score 0.00114
Published At Nov. 1, 2024, midnight
Date Actor Action Source VulnerableCode Version
There are no relevant records.