]> git.ipfire.org Git - thirdparty/curl.git/commitdiff
docs/SECURITY-PROCESS.md: link to example of previous critical flaw
authorDaniel Stenberg <daniel@haxx.se>
Fri, 2 Jun 2023 16:05:22 +0000 (18:05 +0200)
committerDaniel Stenberg <daniel@haxx.se>
Fri, 2 Jun 2023 16:05:22 +0000 (18:05 +0200)
docs/SECURITY-PROCESS.md

index b8cd5dfd76e3bb76685fad4fba8042217802a388..e553507a4cd34841d4d724df3cbcd791eb5201ab 100644 (file)
@@ -180,8 +180,7 @@ Easily exploitable by a remote unauthenticated attacker and lead to system
 compromise (arbitrary code execution) without requiring user interaction, with
 a common configuration on a popular platform. This issue has few restrictions
 and requirements and can be exploited easily using most curl configurations.
-
-No past curl vulnerability has had this severity level.
+[Past example](https://curl.se/docs/CVE-2000-0973.html)
 
 # Not security issues