Show filters
24 Total Results
Displaying 11-20 of 24
Sort by:
Attacker Value
Unknown
CVE-2020-26708
Disclosure Date: June 29, 2023 (last updated October 08, 2023)
requests-xml v0.2.3 was discovered to contain an XML External Entity Injection (XXE) vulnerability which allows attackers to execute arbitrary code via a crafted XML file.
0
Attacker Value
Unknown
CVE-2023-32681
Disclosure Date: May 26, 2023 (last updated February 14, 2025)
Requests is a HTTP library. Since Requests 2.3.0, Requests has been leaking Proxy-Authorization headers to destination servers when redirected to an HTTPS endpoint. This is a product of how we use `rebuild_proxies` to reattach the `Proxy-Authorization` header to requests. For HTTP connections sent through the tunnel, the proxy will identify the header in the request itself and remove it prior to forwarding to the destination server. However when sent over HTTPS, the `Proxy-Authorization` header must be sent in the CONNECT request as the proxy has no visibility into the tunneled request. This results in Requests forwarding proxy credentials to the destination server unintentionally, allowing a malicious actor to potentially exfiltrate sensitive information. This issue has been patched in version 2.31.0.
0
Attacker Value
Unknown
CVE-2022-3402
Disclosure Date: October 28, 2022 (last updated November 08, 2023)
The Log HTTP Requests plugin for WordPress is vulnerable to Stored Cross-Site Scripting via logged HTTP requests in versions up to, and including, 1.3.1 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers who can trick a site's administrator into performing an action like clicking on a link, or an authenticated user with access to a page that sends a request using user-supplied data via the server, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
0
Attacker Value
Unknown
CVE-2022-34782
Disclosure Date: June 30, 2022 (last updated October 07, 2023)
An incorrect permission check in Jenkins requests-plugin Plugin 2.2.16 and earlier allows attackers with Overall/Read permission to view the list of pending requests.
0
Attacker Value
Unknown
CVE-2021-21674
Disclosure Date: June 30, 2021 (last updated October 26, 2023)
A missing permission check in Jenkins requests-plugin Plugin 2.2.6 and earlier allows attackers with Overall/Read permission to view the list of pending requests.
0
Attacker Value
Unknown
CVE-2021-21675
Disclosure Date: June 30, 2021 (last updated February 22, 2025)
A cross-site request forgery (CSRF) vulnerability in Jenkins requests-plugin Plugin 2.2.12 and earlier allows attackers to create requests and/or have administrators apply pending requests.
0
Attacker Value
Unknown
CVE-2021-21676
Disclosure Date: June 30, 2021 (last updated February 22, 2025)
Jenkins requests-plugin Plugin 2.2.7 and earlier does not perform a permission check in an HTTP endpoint, allowing attackers with Overall/Read permission to send test emails to an attacker-specified email address.
0
Attacker Value
Unknown
CVE-2021-29476
Disclosure Date: April 27, 2021 (last updated February 22, 2025)
Requests is a HTTP library written in PHP. Requests mishandles deserialization in FilteredIterator. The issue has been patched and users of `Requests` 1.6.0, 1.6.1 and 1.7.0 should update to version 1.8.0.
0
Attacker Value
Unknown
CVE-2021-28470
Disclosure Date: April 13, 2021 (last updated November 28, 2024)
Visual Studio Code GitHub Pull Requests and Issues Extension Remote Code Execution Vulnerability
0
Attacker Value
Unknown
CVE-2014-8650
Disclosure Date: December 15, 2019 (last updated November 27, 2024)
python-requests-Kerberos through 0.5 does not handle mutual authentication
0