{"uuid": "2eb4e857-72c6-4be5-9bf6-701ba6c65518", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-30221", "type": "seen", "source": "https://t.me/cvedetector/21299", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-30221 - Pitchfork HTTP Response Header Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-30221 \nPublished : March 27, 2025, 3:16 p.m. | 20\u00a0minutes ago \nDescription : Pitchfork is a preforking HTTP server for Rack applications. Versions prior to 0.11.0 are vulnerable to HTTP Response Header Injection when used in conjunction with Rack 3. The issue was fixed in Pitchfork release 0.11.0. No known workarounds are available. \nSeverity: 4.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"27 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-27T16:39:09.000000Z"}