Description
|
|
A vulnerability has been identified in Cisco ASA, which could be exploited by attackers to execute arbitrary scripting code. This issue is caused by an input validation error within the WebVPN clientless mode feature when processing the "Host:" HTTP header, which could be exploited by attackers to cause arbitrary scripting code to be executed by the user's browser in the security context of an affected device.
|