{
  "$type": "site.standard.document",
  "bskyPostRef": {
    "cid": "bafyreigycqh5aefd42noqmenaz2wqvjxf5yihz3y24mndty7nnlivw6pzq",
    "uri": "at://did:plc:6wtxqaikjf62unmnajbfbq5v/app.bsky.feed.post/3mfg5zs4xyvp2"
  },
  "coverImage": {
    "$type": "blob",
    "ref": {
      "$link": "bafkreigcc6vrzvcxt6omrrh625hzrxh43b2xfmwa3zxssndh3xltqub2qa"
    },
    "mimeType": "image/jpeg",
    "size": 72977
  },
  "path": "/critical-apache-tomcat-cve-2026-24733-enables-security-constraint-bypass-via-http-0-9/",
  "publishedAt": "2026-02-21T18:58:55.000Z",
  "site": "https://vpncentral.com",
  "tags": [
    "News",
    "Critical Apache Tomcat CVE-2026-24733 Enables Security Constraint Bypass via HTTP/0.9",
    "VPN Central"
  ],
  "textContent": "Apache Tomcat patched CVE-2026-24733, a security constraint bypass vulnerability. Attackers use HTTP/0.9 requests to evade access controls. The flaw rated Low severity affects specific configurations. Tomcat accepts HTTP/0.9 HEAD requests when GET should block. HTTP/0.9 predates modern methods. It lacks headers and supports only GET normally. Tomcat processes HEAD over HTTP/0.9 without restriction. This bypasses […]\n\nThe post Critical Apache Tomcat CVE-2026-24733 Enables Security Constraint Bypass via HTTP/0.9 appeared first on VPN Central.",
  "title": "Critical Apache Tomcat CVE-2026-24733 Enables Security Constraint Bypass via HTTP/0.9"
}