{"uuid": "34084bd3-3b1d-45a9-84d5-435b37ff61f9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-0938", "type": "seen", "source": "https://t.me/cvedetector/16977", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-0938 - Apache HTTP urllibparse Domain Name Incorrect Parsing Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-0938 \nPublished : Jan. 31, 2025, 6:15 p.m. | 1\u00a0hour, 46\u00a0minutes ago \nDescription : The Python standard library functions `urllib.parse.urlsplit` and `urlparse` accepted domain names that included square brackets which isn't valid according to RFC 3986. Square brackets are only meant to be used as delimiters for specifying IPv6 and IPvFuture hosts in URLs. This could result in differential parsing across the Python URL parser and other specification-compliant URL parsers. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"31 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-31T21:14:44.000000Z"}