Various Tricks in Host Header Attack Vulnerability