From 6de79ee45a5c30398cfc4c5bfa67cd0d0a9058e4 Mon Sep 17 00:00:00 2001 From: bsowers-contrast <92381369+bsowers-contrast@users.noreply.github.com> Date: Fri, 17 Jan 2025 11:06:33 -0600 Subject: [PATCH] Fix runbook content links in README.md --- README.md | 20 ++++++++++---------- 1 file changed, 10 insertions(+), 10 deletions(-) diff --git a/README.md b/README.md index c9588ba..83cba28 100644 --- a/README.md +++ b/README.md @@ -5,19 +5,19 @@ This repository contains detailed runbooks for responding to various security in ## Available Runbooks ### Injection Attacks -- [Command Injection](_runbooks/command-injection) - Handling command injection attacks attempting to execute arbitrary system commands -- [JNDI Injection](_runbooks/jndi-injection) - Responding to JNDI injection attempts targeting Java applications -- [SQL Injection](_runbooks/sql-injection) - Managing SQL injection attacks against database systems -- [Expression Language Injection](_runbooks/expression-language-injection) - Addressing expression language injection vulnerabilities +- [Command Injection](_runbooks/command-injection.md) - Handling command injection attacks attempting to execute arbitrary system commands +- [JNDI Injection](_runbooks/jndi-injection.md) - Responding to JNDI injection attempts targeting Java applications +- [SQL Injection](_runbooks/sql-injection.md) - Managing SQL injection attacks against database systems +- [Expression Language Injection](_runbooks/expression-language-injection.md) - Addressing expression language injection vulnerabilities ### Access Control & Traversal -- [Path Traversal](_runbooks/path-traversal) - Handling attempts to access files outside intended directories -- [HTTP Method Tampering](_runbooks/http-method-tampering) - Managing unauthorized HTTP method manipulation +- [Path Traversal](_runbooks/path-traversal.md) - Handling attempts to access files outside intended directories +- [HTTP Method Tampering](_runbooks/http-method-tampering.md) - Managing unauthorized HTTP method manipulation ### Data & Parsing Vulnerabilities -- [Cross-Site Scripting (XSS)](_runbooks/cross-site-scripting) - Responding to XSS attacks injecting malicious scripts -- [XML External Entity Injection](_runbooks/xml-external-entity-injection) - Handling XXE attacks against XML parsers -- [Untrusted Deserialization](_runbooks/untrusted-deserialization) - Managing deserialization of untrusted data +- [Cross-Site Scripting (XSS)](_runbooks/cross-site-scripting.md) - Responding to XSS attacks injecting malicious scripts +- [XML External Entity Injection](_runbooks/xml-external-entity-injection.md) - Handling XXE attacks against XML parsers +- [Untrusted Deserialization](_runbooks/untrusted-deserialization.md) - Managing deserialization of untrusted data ## Using the Runbooks @@ -29,4 +29,4 @@ This repository contains detailed runbooks for responding to various security in ## Contributing -See our [Contribution Guidelines](CONTRIBUTING.md) for information on how to contribute to these runbooks. \ No newline at end of file +See our [Contribution Guidelines](CONTRIBUTING.md) for information on how to contribute to these runbooks.