Skip to content

Commit

Permalink
fixup CVE-2024-9681.md words
Browse files Browse the repository at this point in the history
  • Loading branch information
bagder committed Nov 7, 2024
1 parent 028f65d commit aa8fded
Showing 1 changed file with 3 additions and 3 deletions.
6 changes: 3 additions & 3 deletions docs/CVE-2024-9681.md
Original file line number Diff line number Diff line change
Expand Up @@ -42,7 +42,7 @@ was otherwise intended to *possibly* be protected.
But:

`example.com` as per above is deliberately setup for HSTS, and servers should
probably expect that clients migth try upgrading to HTTPS for a while outside
probably expect that clients might try upgrading to HTTPS for a while outside
of the time range set in its headers.

The access that fails in this scenario tries to use plain HTTP to the domain.
Expand All @@ -56,8 +56,8 @@ ends up in now and then completely without involving curl issues and therefore
needs to have logic for. An application can for example work around the
situation by simply toggling off HSTS.

This bug is **not** considered a *C mistake* (ie not likely to have been
avoided had we not been using C).
This bug is **not** considered a *C mistake* (not likely to have been avoided
had we not been using C).

This flaw also affects the curl command line tool.

Expand Down

0 comments on commit aa8fded

Please sign in to comment.