An attacker can manipulate an HTTP/2 request to inject a malicious element into the HTTP/1 request line on the server-side.
確定! 回上一頁