An issue in the urllib.parse component of Python before 3.11.4 allows attackers to bypass blocklisting methods by supplying a URL that starts with blank characters.
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-24329.json"