An issue in the urllib.parse component of Python before 3.11.4 allows attackers to bypass blocklisting methods by supplying a URL that starts with blank characters.
"https://github.com/microsoft/AzureLinuxVulnerabilityData/blob/main/osv/AZL-31165.json"