Lucene search

K

Request smuggling leading to endpoint restriction bypass in Gunicorn

🗓️ 16 Apr 2024 00:32:30Reported by GitHub Advisory DatabaseType 
github
 github
🔗 github.com👁 47 Views

Gunicorn request smuggling vulnerability allows endpoint restriction bypass

Show more
Related
Detection
Refs
Vulners
Node
gunicorngunicornRange<22.0.0

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo
16 Apr 2024 00:30Current
7.4High risk
Vulners AI Score7.4
EPSS0.000
47
.json
Report