From 5aafd1b9cd38d43ee44b195a37cb5476e5aac7b5 Mon Sep 17 00:00:00 2001 From: sandeep <8293321+ehsandeep@users.noreply.github.com> Date: Mon, 15 Mar 2021 23:52:42 +0530 Subject: [PATCH] Update CVE-2020-26073.yaml --- cves/2020/CVE-2020-26073.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/cves/2020/CVE-2020-26073.yaml b/cves/2020/CVE-2020-26073.yaml index ceb224ebae..10d7aac230 100644 --- a/cves/2020/CVE-2020-26073.yaml +++ b/cves/2020/CVE-2020-26073.yaml @@ -5,7 +5,7 @@ info: severity: high description: | A vulnerability in the application data endpoints of Cisco SD-WAN vManage Software could allow an unauthenticated, remote attacker to gain access to sensitive information. - reference: + reference: - https://www.cisco.com/c/en/us/support/docs/csa/cisco-sa-vman-traversal-hQh24tmk.html tags: cve,cve2020,cisco,lfi