chore: generate templates checksum 🤖

patch-14
ghost 2024-11-06 17:52:20 +00:00
parent bef1f6439d
commit 0322f968eb
1 changed files with 4 additions and 5 deletions

View File

@ -464,8 +464,8 @@ code/privilege-escalation/linux/rw-sudoers.yaml:f974b1d1a68fd7a8cd24b6f1b61855dd
code/privilege-escalation/linux/sudo-nopasswd.yaml:3117c141f35b9229b6ebe1db10a4fef77aa6ee17
code/privilege-escalation/linux/writable-etc-passwd.yaml:c0ad4796f42aab9c901b52b52b91940172d070e9
contributors.json:bf9c144972f09040dca5bede3d1ad50c698f2833
cves.json:10e37d6868c1535f9f7e70274f988410cfb92547
cves.json-checksum.txt:5c15e54cb4d56e9ebeb1b163a4ce2bbaa1af196b
cves.json:f150efd8a391178d9e035ff89e9eb71da2179d74
cves.json-checksum.txt:e2a2791c91a758a9ff43b54fb6ce748a3c2d7d6d
dast/cves/2018/CVE-2018-19518.yaml:3407e99af553fe5bdb0ffc001a4132e169c55730
dast/cves/2021/CVE-2021-45046.yaml:a52633e88957969fb09969be45c0a8606ee3d752
dast/cves/2022/CVE-2022-34265.yaml:e006df0567f928e43d40050f55d5928a3fbff17e
@ -3033,7 +3033,6 @@ http/cves/2022/CVE-2022-27927.yaml:bea706f327a28583fb9c8db4058f93da20e9d66e
http/cves/2022/CVE-2022-27984.yaml:7685472c8d721e84585c387b111747ef1b590991
http/cves/2022/CVE-2022-27985.yaml:7de01fef2fe8a799a34cbfa788042f1cbc888287
http/cves/2022/CVE-2022-28032.yaml:cf680501ba19b9627d89bd4755e1ca0f546a1110
http/cves/2022/CVE-2022-28033.yaml:e5b7f99467dd76751b49956bf5c52ce7709a414b
http/cves/2022/CVE-2022-28079.yaml:94a540cee17e3e49ec31c9e828d5ea1c5bdce435
http/cves/2022/CVE-2022-28080.yaml:b0b5afd63a37bec422bfff70a98268b8c051c55c
http/cves/2022/CVE-2022-28117.yaml:8db307831c5623c38b79ce199be4310355ea9fb1
@ -3996,7 +3995,7 @@ http/cves/2024/CVE-2024-8698.yaml:b9f9eddc2c3f49906e8e4f5bebcf3c1802d11fbc
http/cves/2024/CVE-2024-8752.yaml:f0f9dca783b57c1fd5e47592e224f888d47c1747
http/cves/2024/CVE-2024-8877.yaml:d5b12c9a0e91fabea84efd078485f4fd57703738
http/cves/2024/CVE-2024-8883.yaml:e02b12d824d8f4df3edd0ee981eb0284215409dd
http/cves/2024/CVE-2024-8963.yaml:fdca1fe9e6d97ae32ddecadc91fe0180202d18b0
http/cves/2024/CVE-2024-8963.yaml:cc338d3caab4aa433607e694a9ec8dc8f45834ac
http/cves/2024/CVE-2024-9014.yaml:ea54c9f07357a92fb915794e7be909d11545753f
http/cves/2024/CVE-2024-9061.yaml:9c44d7fb4a27fd9f40a791d617b7e21981772b70
http/cves/2024/CVE-2024-9234.yaml:b8d98cd3fce5725e967dfb1c4cc22b4eefcbcd7c
@ -9613,7 +9612,7 @@ ssl/tls-version.yaml:4e40f08efbb39172b9280ea9e26ca5f0a14a575a
ssl/untrusted-root-certificate.yaml:a91d36990a1d052f5ee64d170ad8f084d38dab19
ssl/weak-cipher-suites.yaml:62fe808d9dfafda67c410e6cb9445fdc70257e89
ssl/wildcard-tls.yaml:d244f62c7bd22d3868fc6fc7cb9550af6b261210
templates-checksum.txt:1bf68933f1b6d548e45a86acde1041beed0ed325
templates-checksum.txt:0d6e07faf050e96f814da99a9a6561bc19c2825e
wappalyzer-mapping.yml:7f03bd65baacac20c1dc6bbf35ff2407959574f1
workflows/74cms-workflow.yaml:bb010e767ad32b906153e36ea618be545b4e22d0
workflows/acrolinx-workflow.yaml:8434089bb55dec3d7b2ebc6a6f340e73382dd0c4