rpm package
suse/python3-requests&distro=SUSE Linux Enterprise Server 12 SP2-BCL
pkg:rpm/suse/python3-requests&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2-BCL
Vulnerabilities (3)
| CVE | Sev | CVSS | KEV | Affected versions | Fixed in | Published | Description |
|---|---|---|---|---|---|---|---|
| CVE-2021-33503 | — | < 2.24.0-8.14.3 | 2.24.0-8.14.3 | Jun 29, 2021 | An issue was discovered in urllib3 before 1.26.5. When provided with a URL containing many @ characters in the authority component, the authority regular expression exhibits catastrophic backtracking, causing a denial of service if a URL were passed as a parameter or redirected t | ||
| CVE-2018-18074 | — | < 2.20.1-5.2 | 2.20.1-5.2 | Oct 9, 2018 | The Requests package before 2.20.0 for Python sends an HTTP Authorization header to an http URI upon receiving a same-hostname https-to-http redirect, which makes it easier for remote attackers to discover credentials by sniffing the network. | ||
| CVE-2015-2296 | — | < 2.20.1-5.2 | 2.20.1-5.2 | Mar 18, 2015 | The resolve_redirects function in sessions.py in requests 2.1.0 through 2.5.3 allows remote attackers to conduct session fixation attacks via a cookie without a host value in a redirect. |
- CVE-2021-33503Jun 29, 2021affected < 2.24.0-8.14.3fixed 2.24.0-8.14.3
An issue was discovered in urllib3 before 1.26.5. When provided with a URL containing many @ characters in the authority component, the authority regular expression exhibits catastrophic backtracking, causing a denial of service if a URL were passed as a parameter or redirected t
- CVE-2018-18074Oct 9, 2018affected < 2.20.1-5.2fixed 2.20.1-5.2
The Requests package before 2.20.0 for Python sends an HTTP Authorization header to an http URI upon receiving a same-hostname https-to-http redirect, which makes it easier for remote attackers to discover credentials by sniffing the network.
- CVE-2015-2296Mar 18, 2015affected < 2.20.1-5.2fixed 2.20.1-5.2
The resolve_redirects function in sessions.py in requests 2.1.0 through 2.5.3 allows remote attackers to conduct session fixation attacks via a cookie without a host value in a redirect.