From 6de79ee45a5c30398cfc4c5bfa67cd0d0a9058e4 Mon Sep 17 00:00:00 2001
From: bsowers-contrast <92381369+bsowers-contrast@users.noreply.github.com>
Date: Fri, 17 Jan 2025 11:06:33 -0600
Subject: [PATCH] Fix runbook content links in README.md

---
 README.md | 20 ++++++++++----------
 1 file changed, 10 insertions(+), 10 deletions(-)

diff --git a/README.md b/README.md
index c9588ba..83cba28 100644
--- a/README.md
+++ b/README.md
@@ -5,19 +5,19 @@ This repository contains detailed runbooks for responding to various security in
 ## Available Runbooks
 
 ### Injection Attacks
-- [Command Injection](_runbooks/command-injection) - Handling command injection attacks attempting to execute arbitrary system commands
-- [JNDI Injection](_runbooks/jndi-injection) - Responding to JNDI injection attempts targeting Java applications
-- [SQL Injection](_runbooks/sql-injection) - Managing SQL injection attacks against database systems
-- [Expression Language Injection](_runbooks/expression-language-injection) - Addressing expression language injection vulnerabilities
+- [Command Injection](_runbooks/command-injection.md) - Handling command injection attacks attempting to execute arbitrary system commands
+- [JNDI Injection](_runbooks/jndi-injection.md) - Responding to JNDI injection attempts targeting Java applications
+- [SQL Injection](_runbooks/sql-injection.md) - Managing SQL injection attacks against database systems
+- [Expression Language Injection](_runbooks/expression-language-injection.md) - Addressing expression language injection vulnerabilities
 
 ### Access Control & Traversal
-- [Path Traversal](_runbooks/path-traversal) - Handling attempts to access files outside intended directories
-- [HTTP Method Tampering](_runbooks/http-method-tampering) - Managing unauthorized HTTP method manipulation
+- [Path Traversal](_runbooks/path-traversal.md) - Handling attempts to access files outside intended directories
+- [HTTP Method Tampering](_runbooks/http-method-tampering.md) - Managing unauthorized HTTP method manipulation
 
 ### Data & Parsing Vulnerabilities  
-- [Cross-Site Scripting (XSS)](_runbooks/cross-site-scripting) - Responding to XSS attacks injecting malicious scripts
-- [XML External Entity Injection](_runbooks/xml-external-entity-injection) - Handling XXE attacks against XML parsers
-- [Untrusted Deserialization](_runbooks/untrusted-deserialization) - Managing deserialization of untrusted data
+- [Cross-Site Scripting (XSS)](_runbooks/cross-site-scripting.md) - Responding to XSS attacks injecting malicious scripts
+- [XML External Entity Injection](_runbooks/xml-external-entity-injection.md) - Handling XXE attacks against XML parsers
+- [Untrusted Deserialization](_runbooks/untrusted-deserialization.md) - Managing deserialization of untrusted data
 
 ## Using the Runbooks
 
@@ -29,4 +29,4 @@ This repository contains detailed runbooks for responding to various security in
 
 ## Contributing
 
-See our [Contribution Guidelines](CONTRIBUTING.md) for information on how to contribute to these runbooks.
\ No newline at end of file
+See our [Contribution Guidelines](CONTRIBUTING.md) for information on how to contribute to these runbooks.