Skip to content

Commit eaeab5f

Browse files
committed
fix links
1 parent 1aac56e commit eaeab5f

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

source/_posts/Basic HTTP Authentication Risk: Uncovering pyspider Vulnerabilities.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@ This article delves into the consequences of vulnerabilities found by our engine
2020

2121
# Impact
2222

23-
An attacker might manipulate an authenticated victim to click on a malicious link, resulting in code execution on the host running pyspider. After we reported our findings, the maintainer has archived the repository on GitHub, making sure users are aware the project isn't supported anymore (refer to the [Patch](#patch) and [Timeline](#timeline) sections for more info).
23+
An attacker might manipulate an authenticated victim to click on a malicious link, resulting in code execution on the host running pyspider. After we reported our findings, the maintainer has archived the repository on GitHub, making sure users are aware the project isn't supported anymore (refer to the [Patch](#Patch) and [Timeline](#Timeline) sections for more info).
2424

2525
<iframe width="736" height="414" src="https://www.youtube.com/embed/HTzmTucyHmQ" title="Basic HTTP Authentication Risk: Uncovering pyspider Vulnerabilities" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe>
2626

0 commit comments

Comments
 (0)