जमा करें #687568: jameschz Hush 2.0 Improper Neutralization of HTTP Headers for Scripting Syntaxजानकारी

शीर्षकjameschz Hush 2.0 Improper Neutralization of HTTP Headers for Scripting Syntax
विवरण$_SERVER['HOST'] is populated from the HTTP Host header submitted by the client. When the application uses this value directly to build absolute URLs, generate links in emails, or reflect it into HTML responses, an attacker can supply an arbitrary Host header and achieve a range of impacts
स्रोत⚠️ https://github.com/lakshayyverma/CVE-Discovery/blob/main/hush.md
उपयोगकर्ता
 lakshay12311 (UID 91298)
सबमिशन02/11/2025 01:19 PM (6 महीनों पहले)
संयम19/11/2025 05:55 PM (17 days later)
स्थितिस्वीकृत
VulDB प्रविष्टि332978 [jameschz Hush Framework 2.0 HTTP Host Header Util.php $_SERVER['HOST']]
अंक18

Want to stay up to date on a daily basis?

Enable the mail alert feature now!