Enviar #687568: jameschz Hush 2.0 Improper Neutralization of HTTP Headers for Scripting Syntaxinformación

Títulojameschz Hush 2.0 Improper Neutralization of HTTP Headers for Scripting Syntax
Descripción$_SERVER['HOST'] is populated from the HTTP Host header submitted by the client. When the application uses this value directly to build absolute URLs, generate links in emails, or reflect it into HTML responses, an attacker can supply an arbitrary Host header and achieve a range of impacts
Fuente⚠️ https://github.com/lakshayyverma/CVE-Discovery/blob/main/hush.md
Usuario
 lakshay12311 (UID 91298)
Sumisión2025-11-02 13:19 (hace 6 meses)
Moderación2025-11-19 17:55 (17 days later)
EstadoAceptado
Entrada de VulDB332978 [jameschz Hush Framework 2.0 HTTP Host Header Util.php $_SERVER['HOST']]
Puntos18

Want to know what is going to be exploited?

We predict KEV entries!