From: Daniel Stenberg Date: Fri, 2 Jun 2023 16:05:22 +0000 (+0200) Subject: docs/SECURITY-PROCESS.md: link to example of previous critical flaw X-Git-Tag: curl-8_2_0~165 X-Git-Url: http://git.ipfire.org/cgi-bin/gitweb.cgi?a=commitdiff_plain;h=d45b76e0d2e409d6ed76a48b7f04b35de5ac42e7;p=thirdparty%2Fcurl.git docs/SECURITY-PROCESS.md: link to example of previous critical flaw --- diff --git a/docs/SECURITY-PROCESS.md b/docs/SECURITY-PROCESS.md index b8cd5dfd76..e553507a4c 100644 --- a/docs/SECURITY-PROCESS.md +++ b/docs/SECURITY-PROCESS.md @@ -180,8 +180,7 @@ Easily exploitable by a remote unauthenticated attacker and lead to system compromise (arbitrary code execution) without requiring user interaction, with a common configuration on a popular platform. This issue has few restrictions and requirements and can be exploited easily using most curl configurations. - -No past curl vulnerability has had this severity level. +[Past example](https://curl.se/docs/CVE-2000-0973.html) # Not security issues