Syncing Templates
parent
6c532195d5
commit
053dc3477d
|
@ -3,83 +3,7 @@ on:
|
|||
push:
|
||||
paths:
|
||||
- '.new-additions'
|
||||
- 'dast/cves/2018/CVE-2018-19518.yaml'
|
||||
- 'dast/cves/2021/CVE-2021-45046.yaml'
|
||||
- 'dast/cves/2022/CVE-2022-34265.yaml'
|
||||
- 'dast/cves/2022/CVE-2022-42889.yaml'
|
||||
- 'dast/vulnerabilities/cmdi/blind-oast-polyglots.yaml'
|
||||
- 'dast/vulnerabilities/cmdi/ruby-open-rce.yaml'
|
||||
- 'dast/vulnerabilities/crlf/cookie-injection.yaml'
|
||||
- 'dast/vulnerabilities/crlf/crlf-injection.yaml'
|
||||
- 'dast/vulnerabilities/csti/angular-client-side-template-injection.yaml'
|
||||
- 'dast/vulnerabilities/lfi/lfi-keyed.yaml'
|
||||
- 'dast/vulnerabilities/lfi/linux-lfi-fuzz.yaml'
|
||||
- 'dast/vulnerabilities/lfi/windows-lfi-fuzz.yaml'
|
||||
- 'dast/vulnerabilities/redirect/open-redirect.yaml'
|
||||
- 'dast/vulnerabilities/rfi/generic-rfi.yaml'
|
||||
- 'dast/vulnerabilities/sqli/sqli-error-based.yaml'
|
||||
- 'dast/vulnerabilities/ssrf/blind-ssrf.yaml'
|
||||
- 'dast/vulnerabilities/ssrf/response-ssrf.yaml'
|
||||
- 'dast/vulnerabilities/ssti/reflection-ssti.yaml'
|
||||
- 'dast/vulnerabilities/xss/dom-xss.yaml'
|
||||
- 'dast/vulnerabilities/xss/reflected-xss.yaml'
|
||||
- 'dast/vulnerabilities/xxe/generic-xxe.yaml'
|
||||
- 'http/cves/2016/CVE-2016-5674.yaml'
|
||||
- 'http/cves/2018/CVE-2018-10735.yaml'
|
||||
- 'http/cves/2018/CVE-2018-10736.yaml'
|
||||
- 'http/cves/2018/CVE-2018-10737.yaml'
|
||||
- 'http/cves/2018/CVE-2018-10738.yaml'
|
||||
- 'http/cves/2018/CVE-2018-6605.yaml'
|
||||
- 'http/cves/2018/CVE-2018-7314.yaml'
|
||||
- 'http/cves/2019/CVE-2019-9632.yaml'
|
||||
- 'http/cves/2021/CVE-2021-46418.yaml'
|
||||
- 'http/cves/2021/CVE-2021-46419.yaml'
|
||||
- 'http/cves/2022/CVE-2022-29013.yaml'
|
||||
- 'http/cves/2022/CVE-2022-32430.yaml'
|
||||
- 'http/cves/2022/CVE-2022-41412.yaml'
|
||||
- 'http/cves/2023/CVE-2023-0159.yaml'
|
||||
- 'http/cves/2023/CVE-2023-0678.yaml'
|
||||
- 'http/cves/2023/CVE-2023-34993.yaml'
|
||||
- 'http/cves/2023/CVE-2023-47218.yaml'
|
||||
- 'http/cves/2024/CVE-2024-20767.yaml'
|
||||
- 'http/cves/2024/CVE-2024-27564.yaml'
|
||||
- 'http/cves/2024/CVE-2024-28255.yaml'
|
||||
- 'http/cves/2024/CVE-2024-28734.yaml'
|
||||
- 'http/cves/2024/CVE-2024-29059.yaml'
|
||||
- 'http/cves/2024/CVE-2024-29269.yaml'
|
||||
- 'http/default-logins/3com/3Com-wireless-default-login.yaml'
|
||||
- 'http/default-logins/3ware-default-login.yaml'
|
||||
- 'http/default-logins/next-terminal/next-terminal-default-login.yaml'
|
||||
- 'http/exposed-panels/amprion-gridloss-panel.yaml'
|
||||
- 'http/exposed-panels/safenet-authentication-panel.yaml'
|
||||
- 'http/exposed-panels/syfadis-xperience-panel.yaml'
|
||||
- 'http/exposures/configs/deployment-ini.yaml'
|
||||
- 'http/miscellaneous/form-detection.yaml'
|
||||
- 'http/misconfiguration/https-to-http-redirect.yaml'
|
||||
- 'http/technologies/celebrus-detect.yaml'
|
||||
- 'http/technologies/privatebin-detect.yaml'
|
||||
- 'http/technologies/simplesamlphp-detect.yaml'
|
||||
- 'http/technologies/yourls-detect.yaml'
|
||||
- 'http/vulnerabilities/dahua/dahua-eims-rce.yaml'
|
||||
- 'http/vulnerabilities/huatian/huatian-oa-sqli.yaml'
|
||||
- 'http/vulnerabilities/landray/landray-eis-sqli.yaml'
|
||||
- 'http/vulnerabilities/other/voyager-lfi.yaml'
|
||||
- 'javascript/cves/2012/CVE-2012-2122.yaml'
|
||||
- 'javascript/cves/2019/CVE-2019-9193.yaml'
|
||||
- 'javascript/enumeration/minecraft-enum.yaml'
|
||||
- 'javascript/enumeration/pgsql/pgsql-default-db.yaml'
|
||||
- 'javascript/enumeration/pgsql/pgsql-file-read.yaml'
|
||||
- 'javascript/enumeration/pgsql/pgsql-list-database.yaml'
|
||||
- 'javascript/enumeration/pgsql/pgsql-list-password-hashes.yaml'
|
||||
- 'javascript/enumeration/pgsql/pgsql-list-users.yaml'
|
||||
- 'javascript/enumeration/pgsql/pgsql-version-detect.yaml'
|
||||
- 'javascript/misconfiguration/pgsql/pgsql-extensions-rce.yaml'
|
||||
- 'javascript/misconfiguration/pgsql/postgresql-empty-password.yaml'
|
||||
- 'javascript/udp/detection/tftp-detect.yaml'
|
||||
- 'network/c2/darkcomet-trojan.yaml'
|
||||
- 'network/c2/darktrack-rat-trojan.yaml'
|
||||
- 'network/c2/orcus-rat-trojan.yaml'
|
||||
- 'network/c2/xtremerat-trojan.yaml'
|
||||
- 'http/cves/2024/CVE-2024-2879.yaml'
|
||||
workflow_dispatch:
|
||||
jobs:
|
||||
triggerRemoteWorkflow:
|
||||
|
|
Loading…
Reference in New Issue