Display title | HTTP header injection |
Default sort key | HTTP header injection |
Page length (in bytes) | 1,270 |
Namespace ID | 0 |
Page ID | 7524275 |
Page content language | en - English |
Page content model | wikitext |
Indexing by robots | Allowed |
Number of page watchers | 30 |
Number of page watchers who visited in the last 30 days | 2 |
Number of redirects to this page | 1 |
Counted as a content page | Yes |
Wikidata item ID | Q1592277 |
Local description | Web application security vulnerability |
Central description | web application vulnerability that occurs when HTTP headers are dynamically generated from user input; can allow for HTTP response splitting, session fixation (via Set-Cookie), cross-site scripting, and malicious redirect attacks |
Page image | |
Page views in the past 30 days | |
Edit | Allow all users (no expiry set) |
Move | Allow all users (no expiry set) |
Page creator | TDM (talk | contribs) |
Date of page creation | 00:42, 20 October 2006 |
Latest editor | Sohom Datta (talk | contribs) |
Date of latest edit | 23:59, 23 March 2024 |
Total number of edits | 79 |
Recent number of edits (within past 30 days) | 0 |
Recent number of distinct authors | 0 |
Hidden categories (7) | This page is a member of 7 hidden categories (help):
|
Transcluded templates (48) | Pages transcluded onto the current version of this page (help):
|
Wikidata entities used in this page | |