Vulnerabilities
Vulnerable Software
Gorillatoolkit:  >> Handlers  >> 1.2  Security Vulnerabilities
Usage of the CORS handler may apply improper CORS headers, allowing the requester to explicitly control the value of the Access-Control-Allow-Origin header, which bypasses the expected behavior of the Same Origin Policy.
CVSS Score
9.8
EPSS Score
0.001
Published
2022-12-27


Contact Us

Shodan ® - All rights reserved