![]() If header values from a malicious client are passed to the backend server unchecked and unchanged, the client may be able to subvert security checks done by the backend server. |
||
---|---|---|
.. | ||
dhparam | ||
docker-entrypoint.sh | ||
Procfile |
![]() If header values from a malicious client are passed to the backend server unchecked and unchanged, the client may be able to subvert security checks done by the backend server. |
||
---|---|---|
.. | ||
dhparam | ||
docker-entrypoint.sh | ||
Procfile |