Skip to content

Commit 758dfd3

Browse files
author
Renae Metcalf
committed
Make the linkchecker happy
1 parent f596cbb commit 758dfd3

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

docs/topics/information_sources.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -91,7 +91,7 @@ As mentioned in the discussion of [*Exploitation*](../reference/decision_points/
9191
For some classes of vulnerabilities, the proof of concept is well known because the method of exploitation is already part of open-source tools.
9292
An example of this is on-path attacker scenarios for intercepting TLS certificates.
9393
These scenarios are a cluster of related vulnerabilities.
94-
We provide a non-exhaustive [list of CWE-IDs with known proofs of concept](../reference/decision_points/exploitation/#cwe-ids-for-poc). This is list is non-exhaustive becuase there are other conditions that satisfy [*proof of concept*](../reference/decision_points/exploitation.md).
94+
We provide a non-exhaustive [list of CWE-IDs with known proofs of concept](../../reference/decision_points/exploitation/#cwe-ids-for-poc). This is list is non-exhaustive becuase there are other conditions that satisfy [*proof of concept*](../reference/decision_points/exploitation.md).
9595
If paired with automatic searches for exploit code in public repositories, these checks would cover many scenarios.
9696
If paired with active exploitation feeds discussed above, then the value of [*Exploitation*](../reference/decision_points/exploitation.md) could be determined almost entirely from available information without direct analyst involvement at each organization.
9797

0 commit comments

Comments
 (0)