mirror of
https://github.com/nmap/nmap.git
synced 2025-12-27 01:49:03 +00:00
Get rid of unnecessary spaces at the end of lines
This commit is contained in:
@@ -15,14 +15,14 @@ Detects whether the Cisco ASA appliance is vulnerable to the Cisco ASA SSL VPN A
|
||||
-- @output
|
||||
-- PORT STATE SERVICE
|
||||
-- 443/tcp open https
|
||||
-- | http-vuln-cve2014-2128:
|
||||
-- | http-vuln-cve2014-2128:
|
||||
-- | VULNERABLE:
|
||||
-- | Cisco ASA SSL VPN Authentication Bypass Vulnerability
|
||||
-- | State: VULNERABLE
|
||||
-- | Risk factor: Medium CVSSv2: 5.0 (MEDIUM) (AV:N/AC:L/AU:N/C:P/I:N/A:N)
|
||||
-- | Description:
|
||||
-- | The SSL VPN implementation in Cisco Adaptive Security Appliance (ASA) Software 8.2 before 8.2(5.47, 8.3 before 8.3(2.40), 8.4 before 8.4(7.3), 8.6 before 8.6(1.13), 9.0 before 9.0(3.8), and 9.1 before 9.1(3.2) allows remote attackers to bypass authentication via (1) a crafted cookie value within modified HTTP POST data or (2) a crafted URL, aka Bug ID CSCua85555.
|
||||
-- |
|
||||
-- |
|
||||
-- | References:
|
||||
-- | http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140409-asa
|
||||
-- |_ http://cvedetails.com/cve/2014-2128/
|
||||
|
||||
Reference in New Issue
Block a user