A problem has been identified in the handling of HTTP POST requests by Cherokee. Because of this, it may be possible for a remote attacker to deny service to legitimate users of a vulnerable server.
A problem has been identified in the handling of HTTP POST requests by Cherokee. Because of this, it may be possible for a remote attacker to deny service to legitimate users of a vulnerable server.