| Package | Installed | Affected | Info |
|---|---|---|---|
| requests | 0.0.1 | <2.32.2 |
show Affected versions of Requests, when making requests through a Requests `Session`, if the first request is made with `verify=False` to disable cert verification, all subsequent requests to the same host will continue to ignore cert verification regardless of changes to the value of `verify`. This behavior will continue for the lifecycle of the connection in the connection pool. Requests 2.32.0 fixes the issue, but versions 2.32.0 and 2.32.1 were yanked due to conflicts with CVE-2024-35195 mitigation. |
| requests | 0.0.1 | <2.33.0 |
show Affected versions of the requests package are vulnerable to Insecure Temporary File reuse due to predictable temporary filename generation in extract_zipped_paths(). The requests.utils.extract_zipped_paths() utility extracts files from zip archives into the system temporary directory using a deterministic path, and if that file already exists, the function reuses it without validating that it is the expected extracted content. |
| requests | 0.0.1 | <2.32.4 |
show Requests is an HTTP library. Due to a URL parsing issue, Requests releases prior to 2.32.4 may leak .netrc credentials to third parties for specific maliciously-crafted URLs. Users should upgrade to version 2.32.4 to receive a fix. For older versions of Requests, use of the .netrc file can be disabled with `trust_env=False` on one's Requests Session. |
| requests | 0.0.1 | <2.3.0 |
show Requests before 2.3.0 exposes Authorization or Proxy-Authorization headers on redirect. See: CVE-2014-1829. |
| requests | 0.0.1 | <2.3.0 |
show Requests before 2.3.0 exposes Authorization or Proxy-Authorization headers on redirect. This fixes CVE-2014-1830. |
| requests | 0.0.1 | <0.13.4 |
show Specific versions of Requests are susceptible to a Denial of Service (DoS) attack. This vulnerability is triggered when an incorrect password is sent in a digest authentication request, causing the library to indefinitely retry the request. Such behavior can be exploited by an attacker to send numerous requests, leading to a service outage by overwhelming the system's resources. |
| Package | Installed | Affected | Info |
|---|---|---|---|
| py | 1.8.2 | <=1.11.0 |
show ** DISPUTED ** Py throughout 1.11.0 allows remote attackers to conduct a ReDoS (Regular expression Denial of Service) attack via a Subversion repository with crafted info data because the InfoSvnCommand argument is mishandled. https://github.com/pytest-dev/py/issues/287 |
| py | 1.8.2 | <=1.9.0 |
show Py 1.10.0 includes a fix for CVE-2020-29651: A denial of service via regular expression in the py.path.svnwc component of py (aka python-py) through 1.9.0 could be used by attackers to cause a compute-time denial of service attack by supplying malicious input to the blame functionality. |
| Package | Installed | Affected | Info |
|---|---|---|---|
| py | 1.8.2 | <=1.11.0 |
show ** DISPUTED ** Py throughout 1.11.0 allows remote attackers to conduct a ReDoS (Regular expression Denial of Service) attack via a Subversion repository with crafted info data because the InfoSvnCommand argument is mishandled. https://github.com/pytest-dev/py/issues/287 |
| py | 1.8.2 | <=1.9.0 |
show Py 1.10.0 includes a fix for CVE-2020-29651: A denial of service via regular expression in the py.path.svnwc component of py (aka python-py) through 1.9.0 could be used by attackers to cause a compute-time denial of service attack by supplying malicious input to the blame functionality. |
https://pyup.io/repos/github/dubergonzoni/libpythonpro/python-3-shield.svg
[](https://pyup.io/repos/github/dubergonzoni/libpythonpro/)
.. image:: https://pyup.io/repos/github/dubergonzoni/libpythonpro/python-3-shield.svg
:target: https://pyup.io/repos/github/dubergonzoni/libpythonpro/
:alt: Python 3
<a href="https://pyup.io/repos/github/dubergonzoni/libpythonpro/"><img src="https://pyup.io/repos/github/dubergonzoni/libpythonpro/shield.svg" alt="Python 3" /></a>
!https://pyup.io/repos/github/dubergonzoni/libpythonpro/python-3-shield.svg(Python 3)!:https://pyup.io/repos/github/dubergonzoni/libpythonpro/
{<img src="https://pyup.io/repos/github/dubergonzoni/libpythonpro/python-3-shield.svg" alt="Python 3" />}[https://pyup.io/repos/github/dubergonzoni/libpythonpro/]
https://pyup.io/repos/github/dubergonzoni/libpythonpro/shield.svg
[](https://pyup.io/repos/github/dubergonzoni/libpythonpro/)
.. image:: https://pyup.io/repos/github/dubergonzoni/libpythonpro/shield.svg
:target: https://pyup.io/repos/github/dubergonzoni/libpythonpro/
:alt: Updates
<a href="https://pyup.io/repos/github/dubergonzoni/libpythonpro/"><img src="https://pyup.io/repos/github/dubergonzoni/libpythonpro/shield.svg" alt="Updates" /></a>
!https://pyup.io/repos/github/dubergonzoni/libpythonpro/shield.svg(Updates)!:https://pyup.io/repos/github/dubergonzoni/libpythonpro/
{<img src="https://pyup.io/repos/github/dubergonzoni/libpythonpro/shield.svg" alt="Updates" />}[https://pyup.io/repos/github/dubergonzoni/libpythonpro/]