Total vulnerabilities in the database
In Ktor before 1.3.0, request smuggling is possible when running behind a proxy that doesn't handle Content-Length and Transfer-Encoding properly or doesn't handle \n as a headers separator.
Software | From | Fixed in |
---|---|---|
jetbrains / ktor | - | 1.3.0 |
![]() |
- | 1.3.0 |
![]() |
- | 1.3.0 |