Логотип exploitDog
bind:"CVE-2024-37891" OR bind:"CVE-2024-6345"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2024-37891" OR bind:"CVE-2024-6345"

Количество 59

Количество 59

rocky логотип

RLSA-2024:6309

6 месяцев назад

Moderate: fence-agents security update

EPSS: Низкий
oracle-oval логотип

ELSA-2024-6311

около 1 года назад

ELSA-2024-6311: resource-agents security update (MODERATE)

EPSS: Низкий
oracle-oval логотип

ELSA-2024-6309

около 1 года назад

ELSA-2024-6309: fence-agents security update (MODERATE)

EPSS: Низкий
ubuntu логотип

CVE-2024-37891

больше 1 года назад

urllib3 is a user-friendly HTTP client library for Python. When using urllib3's proxy support with `ProxyManager`, the `Proxy-Authorization` header is only sent to the configured proxy, as expected. However, when sending HTTP requests *without* using urllib3's proxy support, it's possible to accidentally configure the `Proxy-Authorization` header even though it won't have any effect as the request is not using a forwarding proxy or a tunneling proxy. In those cases, urllib3 doesn't treat the `Proxy-Authorization` HTTP header as one carrying authentication material and thus doesn't strip the header on cross-origin redirects. Because this is a highly unlikely scenario, we believe the severity of this vulnerability is low for almost all users. Out of an abundance of caution urllib3 will automatically strip the `Proxy-Authorization` header during cross-origin redirects to avoid the small chance that users are doing this on accident. Users should use urllib3's proxy support or disable au...

CVSS3: 4.4
EPSS: Низкий
redhat логотип

CVE-2024-37891

больше 1 года назад

urllib3 is a user-friendly HTTP client library for Python. When using urllib3's proxy support with `ProxyManager`, the `Proxy-Authorization` header is only sent to the configured proxy, as expected. However, when sending HTTP requests *without* using urllib3's proxy support, it's possible to accidentally configure the `Proxy-Authorization` header even though it won't have any effect as the request is not using a forwarding proxy or a tunneling proxy. In those cases, urllib3 doesn't treat the `Proxy-Authorization` HTTP header as one carrying authentication material and thus doesn't strip the header on cross-origin redirects. Because this is a highly unlikely scenario, we believe the severity of this vulnerability is low for almost all users. Out of an abundance of caution urllib3 will automatically strip the `Proxy-Authorization` header during cross-origin redirects to avoid the small chance that users are doing this on accident. Users should use urllib3's proxy support or disable au...

CVSS3: 4.4
EPSS: Низкий
nvd логотип

CVE-2024-37891

больше 1 года назад

urllib3 is a user-friendly HTTP client library for Python. When using urllib3's proxy support with `ProxyManager`, the `Proxy-Authorization` header is only sent to the configured proxy, as expected. However, when sending HTTP requests *without* using urllib3's proxy support, it's possible to accidentally configure the `Proxy-Authorization` header even though it won't have any effect as the request is not using a forwarding proxy or a tunneling proxy. In those cases, urllib3 doesn't treat the `Proxy-Authorization` HTTP header as one carrying authentication material and thus doesn't strip the header on cross-origin redirects. Because this is a highly unlikely scenario, we believe the severity of this vulnerability is low for almost all users. Out of an abundance of caution urllib3 will automatically strip the `Proxy-Authorization` header during cross-origin redirects to avoid the small chance that users are doing this on accident. Users should use urllib3's proxy support or disable auto

CVSS3: 4.4
EPSS: Низкий
msrc логотип

CVE-2024-37891

11 месяцев назад

CVSS3: 4.4
EPSS: Низкий
debian логотип

CVE-2024-37891

больше 1 года назад

urllib3 is a user-friendly HTTP client library for Python. When using ...

CVSS3: 4.4
EPSS: Низкий
ubuntu логотип

CVE-2024-6345

больше 1 года назад

A vulnerability in the package_index module of pypa/setuptools versions up to 69.1.1 allows for remote code execution via its download functions. These functions, which are used to download packages from URLs provided by users or retrieved from package index servers, are susceptible to code injection. If these functions are exposed to user-controlled inputs, such as package URLs, they can execute arbitrary commands on the system. The issue is fixed in version 70.0.

CVSS3: 8.8
EPSS: Низкий
redhat логотип

CVE-2024-6345

больше 1 года назад

A vulnerability in the package_index module of pypa/setuptools versions up to 69.1.1 allows for remote code execution via its download functions. These functions, which are used to download packages from URLs provided by users or retrieved from package index servers, are susceptible to code injection. If these functions are exposed to user-controlled inputs, such as package URLs, they can execute arbitrary commands on the system. The issue is fixed in version 70.0.

CVSS3: 8.8
EPSS: Низкий
nvd логотип

CVE-2024-6345

больше 1 года назад

A vulnerability in the package_index module of pypa/setuptools versions up to 69.1.1 allows for remote code execution via its download functions. These functions, which are used to download packages from URLs provided by users or retrieved from package index servers, are susceptible to code injection. If these functions are exposed to user-controlled inputs, such as package URLs, they can execute arbitrary commands on the system. The issue is fixed in version 70.0.

CVSS3: 8.8
EPSS: Низкий
msrc логотип

CVE-2024-6345

около 1 года назад

CVSS3: 8.8
EPSS: Низкий
debian логотип

CVE-2024-6345

больше 1 года назад

A vulnerability in the package_index module of pypa/setuptools version ...

CVSS3: 8.8
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:4358-1

11 месяцев назад

Security update for python-urllib3_1

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:2879-1

около 1 года назад

Security update for python-urllib3

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:2662-1

больше 1 года назад

Security update for python-urllib3

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:2320-1

больше 1 года назад

Security update for python-urllib3

EPSS: Низкий
redos логотип

ROS-20241211-11

11 месяцев назад

Уязвимость python3-urllib3

CVSS3: 4.4
EPSS: Низкий
rocky логотип

RLSA-2024:9457

8 месяцев назад

Moderate: python3.12-urllib3 security update

EPSS: Низкий
rocky логотип

RLSA-2024:8843

12 месяцев назад

Moderate: python3.11-urllib3 security update

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
rocky логотип
RLSA-2024:6309

Moderate: fence-agents security update

6 месяцев назад
oracle-oval логотип
ELSA-2024-6311

ELSA-2024-6311: resource-agents security update (MODERATE)

около 1 года назад
oracle-oval логотип
ELSA-2024-6309

ELSA-2024-6309: fence-agents security update (MODERATE)

около 1 года назад
ubuntu логотип
CVE-2024-37891

urllib3 is a user-friendly HTTP client library for Python. When using urllib3's proxy support with `ProxyManager`, the `Proxy-Authorization` header is only sent to the configured proxy, as expected. However, when sending HTTP requests *without* using urllib3's proxy support, it's possible to accidentally configure the `Proxy-Authorization` header even though it won't have any effect as the request is not using a forwarding proxy or a tunneling proxy. In those cases, urllib3 doesn't treat the `Proxy-Authorization` HTTP header as one carrying authentication material and thus doesn't strip the header on cross-origin redirects. Because this is a highly unlikely scenario, we believe the severity of this vulnerability is low for almost all users. Out of an abundance of caution urllib3 will automatically strip the `Proxy-Authorization` header during cross-origin redirects to avoid the small chance that users are doing this on accident. Users should use urllib3's proxy support or disable au...

CVSS3: 4.4
0%
Низкий
больше 1 года назад
redhat логотип
CVE-2024-37891

urllib3 is a user-friendly HTTP client library for Python. When using urllib3's proxy support with `ProxyManager`, the `Proxy-Authorization` header is only sent to the configured proxy, as expected. However, when sending HTTP requests *without* using urllib3's proxy support, it's possible to accidentally configure the `Proxy-Authorization` header even though it won't have any effect as the request is not using a forwarding proxy or a tunneling proxy. In those cases, urllib3 doesn't treat the `Proxy-Authorization` HTTP header as one carrying authentication material and thus doesn't strip the header on cross-origin redirects. Because this is a highly unlikely scenario, we believe the severity of this vulnerability is low for almost all users. Out of an abundance of caution urllib3 will automatically strip the `Proxy-Authorization` header during cross-origin redirects to avoid the small chance that users are doing this on accident. Users should use urllib3's proxy support or disable au...

CVSS3: 4.4
0%
Низкий
больше 1 года назад
nvd логотип
CVE-2024-37891

urllib3 is a user-friendly HTTP client library for Python. When using urllib3's proxy support with `ProxyManager`, the `Proxy-Authorization` header is only sent to the configured proxy, as expected. However, when sending HTTP requests *without* using urllib3's proxy support, it's possible to accidentally configure the `Proxy-Authorization` header even though it won't have any effect as the request is not using a forwarding proxy or a tunneling proxy. In those cases, urllib3 doesn't treat the `Proxy-Authorization` HTTP header as one carrying authentication material and thus doesn't strip the header on cross-origin redirects. Because this is a highly unlikely scenario, we believe the severity of this vulnerability is low for almost all users. Out of an abundance of caution urllib3 will automatically strip the `Proxy-Authorization` header during cross-origin redirects to avoid the small chance that users are doing this on accident. Users should use urllib3's proxy support or disable auto

CVSS3: 4.4
0%
Низкий
больше 1 года назад
msrc логотип
CVSS3: 4.4
0%
Низкий
11 месяцев назад
debian логотип
CVE-2024-37891

urllib3 is a user-friendly HTTP client library for Python. When using ...

CVSS3: 4.4
0%
Низкий
больше 1 года назад
ubuntu логотип
CVE-2024-6345

A vulnerability in the package_index module of pypa/setuptools versions up to 69.1.1 allows for remote code execution via its download functions. These functions, which are used to download packages from URLs provided by users or retrieved from package index servers, are susceptible to code injection. If these functions are exposed to user-controlled inputs, such as package URLs, they can execute arbitrary commands on the system. The issue is fixed in version 70.0.

CVSS3: 8.8
5%
Низкий
больше 1 года назад
redhat логотип
CVE-2024-6345

A vulnerability in the package_index module of pypa/setuptools versions up to 69.1.1 allows for remote code execution via its download functions. These functions, which are used to download packages from URLs provided by users or retrieved from package index servers, are susceptible to code injection. If these functions are exposed to user-controlled inputs, such as package URLs, they can execute arbitrary commands on the system. The issue is fixed in version 70.0.

CVSS3: 8.8
5%
Низкий
больше 1 года назад
nvd логотип
CVE-2024-6345

A vulnerability in the package_index module of pypa/setuptools versions up to 69.1.1 allows for remote code execution via its download functions. These functions, which are used to download packages from URLs provided by users or retrieved from package index servers, are susceptible to code injection. If these functions are exposed to user-controlled inputs, such as package URLs, they can execute arbitrary commands on the system. The issue is fixed in version 70.0.

CVSS3: 8.8
5%
Низкий
больше 1 года назад
msrc логотип
CVSS3: 8.8
5%
Низкий
около 1 года назад
debian логотип
CVE-2024-6345

A vulnerability in the package_index module of pypa/setuptools version ...

CVSS3: 8.8
5%
Низкий
больше 1 года назад
suse-cvrf логотип
SUSE-SU-2024:4358-1

Security update for python-urllib3_1

0%
Низкий
11 месяцев назад
suse-cvrf логотип
SUSE-SU-2024:2879-1

Security update for python-urllib3

0%
Низкий
около 1 года назад
suse-cvrf логотип
SUSE-SU-2024:2662-1

Security update for python-urllib3

0%
Низкий
больше 1 года назад
suse-cvrf логотип
SUSE-SU-2024:2320-1

Security update for python-urllib3

0%
Низкий
больше 1 года назад
redos логотип
ROS-20241211-11

Уязвимость python3-urllib3

CVSS3: 4.4
0%
Низкий
11 месяцев назад
rocky логотип
RLSA-2024:9457

Moderate: python3.12-urllib3 security update

0%
Низкий
8 месяцев назад
rocky логотип
RLSA-2024:8843

Moderate: python3.11-urllib3 security update

0%
Низкий
12 месяцев назад

Уязвимостей на страницу