Lucene search

K

Requests Security Vulnerabilities

cve
cve

CVE-2024-32731

SAP My Travel Requests does not perform necessary authorization checks for an authenticated user, resulting in escalation of privileges. On successful exploitation, the attacker can upload a malicious attachment to a business trip request which will lead to a low impact on the confidentiality,...

5.5CVSS

7.4AI Score

0.0004EPSS

2024-05-14 04:17 PM
10
cve
cve

CVE-2024-25643

The SAP Fiori app (My Overtime Request) - version 605, does not perform the necessary authorization checks for an authenticated user which may result in an escalation of privileges. It is possible to manipulate the URLs of data requests to access information that the user should not have access...

4.3CVSS

7.3AI Score

0.0004EPSS

2024-02-13 04:15 AM
14
cve
cve

CVE-2023-33317

Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in WooCommerce Returns and Warranty Requests plugin <= 2.1.6...

6.1CVSS

6AI Score

0.0005EPSS

2023-08-30 01:15 PM
22
cve
cve

CVE-2023-36867

Visual Studio Code GitHub Pull Requests and Issues Extension Remote Code Execution...

7.8CVSS

8.1AI Score

0.001EPSS

2023-07-11 06:15 PM
44
cve
cve

CVE-2020-26708

requests-xml v0.2.3 was discovered to contain an XML External Entity Injection (XXE) vulnerability which allows attackers to execute arbitrary code via a crafted XML...

7.5CVSS

7.8AI Score

0.001EPSS

2023-06-29 09:15 PM
28
cve
cve

CVE-2023-32681

Requests is a HTTP library. Since Requests 2.3.0, Requests has been leaking Proxy-Authorization headers to destination servers when redirected to an HTTPS endpoint. This is a product of how we use rebuild_proxies to reattach the Proxy-Authorization header to requests. For HTTP connections sent...

6.1CVSS

6.2AI Score

0.001EPSS

2023-05-26 06:15 PM
670
cve
cve

CVE-2023-24528

SAP Fiori apps for Travel Management in SAP ERP (My Travel Requests) - version 600, allows an authenticated attacker to exploit a certain misconfigured application endpoint to view sensitive data. This endpoint is normally exposed over the network and successful exploitation can lead to exposure...

6.5CVSS

6.3AI Score

0.001EPSS

2023-02-14 04:15 AM
25
cve
cve

CVE-2022-3402

The Log HTTP Requests plugin for WordPress is vulnerable to Stored Cross-Site Scripting via logged HTTP requests in versions up to, and including, 1.3.1 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers who can trick a site's...

6.1CVSS

5.7AI Score

0.001EPSS

2022-10-28 07:15 PM
27
2
cve
cve

CVE-2022-34782

An incorrect permission check in Jenkins requests-plugin Plugin 2.2.16 and earlier allows attackers with Overall/Read permission to view the list of pending...

4.3CVSS

4.4AI Score

0.001EPSS

2022-06-30 06:15 PM
240
3
cve
cve

CVE-2021-21676

Jenkins requests-plugin Plugin 2.2.7 and earlier does not perform a permission check in an HTTP endpoint, allowing attackers with Overall/Read permission to send test emails to an attacker-specified email...

4.3CVSS

4.4AI Score

0.001EPSS

2021-06-30 05:15 PM
44
cve
cve

CVE-2021-21675

A cross-site request forgery (CSRF) vulnerability in Jenkins requests-plugin Plugin 2.2.12 and earlier allows attackers to create requests and/or have administrators apply pending...

6.5CVSS

6.4AI Score

0.001EPSS

2021-06-30 05:15 PM
49
cve
cve

CVE-2021-21674

A missing permission check in Jenkins requests-plugin Plugin 2.2.6 and earlier allows attackers with Overall/Read permission to view the list of pending...

4.3CVSS

4.4AI Score

0.001EPSS

2021-06-30 05:15 PM
62
2
cve
cve

CVE-2021-29476

Requests is a HTTP library written in PHP. Requests mishandles deserialization in FilteredIterator. The issue has been patched and users of Requests 1.6.0, 1.6.1 and 1.7.0 should update to version...

9.8CVSS

9.3AI Score

0.008EPSS

2021-04-27 09:15 PM
60
2
cve
cve

CVE-2021-28470

Visual Studio Code GitHub Pull Requests and Issues Extension Remote Code Execution...

7.8CVSS

7.9AI Score

0.277EPSS

2021-04-13 08:15 PM
64
4
cve
cve

CVE-2014-8650

python-requests-Kerberos through 0.5 does not handle mutual...

9.8CVSS

9.4AI Score

0.008EPSS

2019-12-15 10:15 PM
91
cve
cve

CVE-2018-18074

The Requests package before 2.20.0 for Python sends an HTTP Authorization header to an http URI upon receiving a same-hostname https-to-http redirect, which makes it easier for remote attackers to discover credentials by sniffing the...

7.5CVSS

7.5AI Score

0.006EPSS

2018-10-09 05:29 PM
1458
4
cve
cve

CVE-2015-2296

The resolve_redirects function in sessions.py in requests 2.1.0 through 2.5.3 allows remote attackers to conduct session fixation attacks via a cookie without a host value in a...

5.5AI Score

0.016EPSS

2015-03-18 04:59 PM
106
cve
cve

CVE-2014-1830

Requests (aka python-requests) before 2.3.0 allows remote servers to obtain sensitive information by reading the Proxy-Authorization header in a redirected...

5.8AI Score

0.003EPSS

2014-10-15 02:55 PM
45
cve
cve

CVE-2014-1829

Requests (aka python-requests) before 2.3.0 allows remote servers to obtain a netrc password by reading the Authorization header in a redirected...

6.3AI Score

0.003EPSS

2014-10-15 02:55 PM
49