From 5ac9edb7e1eb65edb1c8a5a1c544e6b25c2ec914 Mon Sep 17 00:00:00 2001 From: djalal Date: Wed, 9 Nov 2011 10:21:08 +0000 Subject: [PATCH] Fix the vulnerability CVE ID in the documentation. --- scripts/http-method-tamper.nse | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/scripts/http-method-tamper.nse b/scripts/http-method-tamper.nse index 6de0fc25f..b6e4efc0a 100644 --- a/scripts/http-method-tamper.nse +++ b/scripts/http-method-tamper.nse @@ -6,7 +6,7 @@ bypassed via a HEAD request. RFC 2616 specifies that the HEAD request should be with no returned response body. The script also detects if the URL does not require authentication at all. For more information, see: -* CVE-2010-738 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0738 +* CVE-2010-0738 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0738 * http://www.imperva.com/resources/glossary/http_verb_tampering.html * https://www.owasp.org/index.php/Testing_for_HTTP_Methods_and_XST_%28OWASP-CM-008%29