From b88d3ac638ce91cce188ad5b586049cb4c6f00eb Mon Sep 17 00:00:00 2001 From: Aaron Collier Date: Mon, 15 Aug 2022 11:47:37 +0200 Subject: [PATCH 1/3] =?UTF-8?q?=F0=9F=9A=A8=20Update=20a=20link=20to=20the?= =?UTF-8?q?=20Internet=20Archive?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit --- docs/src/security/waf.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/docs/src/security/waf.md b/docs/src/security/waf.md index 93e8d329f5..aa03f3e62c 100644 --- a/docs/src/security/waf.md +++ b/docs/src/security/waf.md @@ -102,7 +102,7 @@ Platform.sh's WAF also includes several protective rules for vulnerabilities fou ### Magento -#### [Magestore extension vulnerability (2019-SQLi)](https://magento.com/security/news/critical-vulnerability-magestore-store-locator-extension) +#### [Magestore extension vulnerability (2019-SQLi)](https://web.archive.org/web/20210414043507/https://magento.com/security/news/critical-vulnerability-magestore-store-locator-extensionstore-store-locator-extension) | Type: | SQL injection | |-----|-----| From 7ac52117a46c9cee8b5b9eab3534304a66300a14 Mon Sep 17 00:00:00 2001 From: Aaron Collier Date: Mon, 15 Aug 2022 11:49:00 +0200 Subject: [PATCH 2/3] =?UTF-8?q?=E2=AC=86=EF=B8=8F=20Update=20version=20of?= =?UTF-8?q?=20issue=20creator?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Was very old. Should have been 4 from the start. --- .github/workflows/scheduled-check-links.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/.github/workflows/scheduled-check-links.yaml b/.github/workflows/scheduled-check-links.yaml index a733952b31..f3fe038df6 100644 --- a/.github/workflows/scheduled-check-links.yaml +++ b/.github/workflows/scheduled-check-links.yaml @@ -64,7 +64,7 @@ jobs: - name: Create issue from Markdown file id: create-issue if: ${{ always() }} - uses: peter-evans/create-issue-from-file@v2 + uses: peter-evans/create-issue-from-file@v4 with: title: ":bug: Broken links" content-filepath: broken_links.md From 2181c143475788aa2cd200df0cd9b94118bb9337 Mon Sep 17 00:00:00 2001 From: Aaron Collier Date: Wed, 17 Aug 2022 08:54:08 +0200 Subject: [PATCH 3/3] =?UTF-8?q?=E2=9C=8F=EF=B8=8F=20Fix=20paste=20error?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit --- docs/src/security/waf.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/docs/src/security/waf.md b/docs/src/security/waf.md index aa03f3e62c..566a9f3032 100644 --- a/docs/src/security/waf.md +++ b/docs/src/security/waf.md @@ -102,7 +102,7 @@ Platform.sh's WAF also includes several protective rules for vulnerabilities fou ### Magento -#### [Magestore extension vulnerability (2019-SQLi)](https://web.archive.org/web/20210414043507/https://magento.com/security/news/critical-vulnerability-magestore-store-locator-extensionstore-store-locator-extension) +#### [Magestore extension vulnerability (2019-SQLi)](https://web.archive.org/web/20210414043507/https://magento.com/security/news/critical-vulnerability-magestore-store-locator-extension) | Type: | SQL injection | |-----|-----|