关联漏洞
            
        
            描述
            Captures password reset tokens from Mailcow Host header injection attacks. 
        
        
            介绍
            # HTTPS File Server
A secure HTTPS file server implemented in Go, designed to serve static files over encrypted connections with self-signed certificate support.
## Features
- Serves static files over HTTPS
- Automatic self-signed certificate generation
- Request logging with response codes and timing
- Secure TLS configuration (TLS 1.2+)
- Protection against path traversal attacks
- Automatic MIME type detection
- Cross-platform compatibility
## Prerequisites
- Go 1.16 or higher
- OpenSSL (for certificate generation)
## Installation and Set Up
```bash
git clone https://github.com/enzocipher/CVE-2025-25198.git
cd https-file-server
go build -o https-server
./https-server
```
        
        文件快照
        
            
                
 [4.0K]  /data/pocs/c7e7bb265ad218825ec6b6a15e01539e98588763
├── [1.0K]  LICENSE
├── [3.2K]  poc.go
└── [ 690]  README.md
0 directories, 3 files
                
             
         
        备注
        
            
                1. 建议优先通过来源进行访问。
                2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
                3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。