CSV Injection vulnerability in Nikto 2.1.6 and earlier allows remote attackers to inject arbitrary OS commands via the Server field in an HTTP response header, which is directly injected into a CSV report.
{ "binaries": [ { "binary_version": "1:2.1.5-1", "binary_name": "nikto" } ] }
{ "binaries": [ { "binary_version": "1:2.1.5-2", "binary_name": "nikto" } ] }