diff --git a/.github/workflows/scheduled-check-links.yaml b/.github/workflows/scheduled-check-links.yaml index a733952b31..f3fe038df6 100644 --- a/.github/workflows/scheduled-check-links.yaml +++ b/.github/workflows/scheduled-check-links.yaml @@ -64,7 +64,7 @@ jobs: - name: Create issue from Markdown file id: create-issue if: ${{ always() }} - uses: peter-evans/create-issue-from-file@v2 + uses: peter-evans/create-issue-from-file@v4 with: title: ":bug: Broken links" content-filepath: broken_links.md diff --git a/docs/src/security/waf.md b/docs/src/security/waf.md index 93e8d329f5..566a9f3032 100644 --- a/docs/src/security/waf.md +++ b/docs/src/security/waf.md @@ -102,7 +102,7 @@ Platform.sh's WAF also includes several protective rules for vulnerabilities fou ### Magento -#### [Magestore extension vulnerability (2019-SQLi)](https://magento.com/security/news/critical-vulnerability-magestore-store-locator-extension) +#### [Magestore extension vulnerability (2019-SQLi)](https://web.archive.org/web/20210414043507/https://magento.com/security/news/critical-vulnerability-magestore-store-locator-extension) | Type: | SQL injection | |-----|-----|