You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/topics/information_sources.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -91,7 +91,7 @@ As mentioned in the discussion of [*Exploitation*](../reference/decision_points/
91
91
For some classes of vulnerabilities, the proof of concept is well known because the method of exploitation is already part of open-source tools.
92
92
An example of this is on-path attacker scenarios for intercepting TLS certificates.
93
93
These scenarios are a cluster of related vulnerabilities.
94
-
We provide a non-exhaustive [list of CWE-IDs with known proofs of concept](../reference/decision_points/exploitation/#cwe-ids-for-poc). This is list is non-exhaustive becuase there are other conditions that satisfy [*proof of concept*](../reference/decision_points/exploitation.md).
94
+
We provide a non-exhaustive [list of CWE-IDs with known proofs of concept](../../reference/decision_points/exploitation/#cwe-ids-for-poc). This is list is non-exhaustive becuase there are other conditions that satisfy [*proof of concept*](../reference/decision_points/exploitation.md).
95
95
If paired with automatic searches for exploit code in public repositories, these checks would cover many scenarios.
96
96
If paired with active exploitation feeds discussed above, then the value of [*Exploitation*](../reference/decision_points/exploitation.md) could be determined almost entirely from available information without direct analyst involvement at each organization.
0 commit comments