Auto Generated Templates Checksum [Fri Mar 1 07:32:44 UTC 2024] 🤖

patch-1
GitHub Action 2024-03-01 07:32:44 +00:00
parent 66fbf79c8d
commit 30a97f7b88
1 changed files with 5 additions and 5 deletions

View File

@ -105,8 +105,8 @@ config/pentest.yml:c7b04a39e2efaf1a5f627da9b49ecf714d927f0e
config/privilege-escalation.yml:325607b721fcea55111f8698b10951fd2f0d17b8
config/recommended.yml:eb4d0cb29634218f0279692e8c59fa1906d7148c
contributors.json:8d840b1db8c1af9a3927448841f817aa9c850de9
cves.json:d97b64843e81ded58e0fd5a768024ec2c37f1265
cves.json-checksum.txt:bde4b6219a3dae5156a09d26bf8d39f98e704f25
cves.json:51d8ac58d8ffdf6cfd4660d3e19373bb08bb6605
cves.json-checksum.txt:fdca644f563bcfe217c57881fc5991db50a942e4
dns/azure-takeover-detection.yaml:34e8e8a0db3e2ff7af0bf8df8ee9c54f2ee8e3b4
dns/caa-fingerprint.yaml:71845ba0a32b1968e23b507166275ee4c1f84b24
dns/detect-dangling-cname.yaml:0c5204f22465c8ebb8ae31e6265ffa5c0cd4b6e2
@ -2562,7 +2562,7 @@ http/cves/2022/CVE-2022-32771.yaml:9d53b2c8a0a6f142bc43929545fd3dff40e1bbc4
http/cves/2022/CVE-2022-32772.yaml:da27806050d52e5cac3989730b256c6f4509314c
http/cves/2022/CVE-2022-33119.yaml:13ad425beed298fb00c4917231e181b1e640126d
http/cves/2022/CVE-2022-33174.yaml:bf783832e44576d526ce3516d5f2e22693a208b3
http/cves/2022/CVE-2022-33891.yaml:c46aeff1d75d06b137e25ca1bf72bbc0119b604a
http/cves/2022/CVE-2022-33891.yaml:9ceece0fc87fcbba5cae0c0b1ee27fdeb9d2834d
http/cves/2022/CVE-2022-33901.yaml:d83eda96f781a13ca34491b22a2c184694eee183
http/cves/2022/CVE-2022-33965.yaml:3739b3179daf3df8780e204c3eb4c3b981cf15d6
http/cves/2022/CVE-2022-34045.yaml:db5379939e4c83f95058bda21f7e05a1f0331aaa
@ -3041,7 +3041,7 @@ http/cves/2023/CVE-2023-6623.yaml:9ee42ac9d9ed6c2c8e26d9ab039ae2d7a324c18c
http/cves/2023/CVE-2023-6634.yaml:3e5d401d42812445929734319bbd63ed5f5823c2
http/cves/2023/CVE-2023-6831.yaml:cafdd086fd6ded52b8bf7bddbfbcbe7bc89890ff
http/cves/2023/CVE-2023-6875.yaml:8b82d1b639505427889b14e159a706a66f65bae1
http/cves/2023/CVE-2023-6895.yaml:0ac524cfa9cecc4bfe0a8de65bc0f2f8888be106
http/cves/2023/CVE-2023-6895.yaml:0ef4052f3a65107072ee47d11c4028e55f54b472
http/cves/2023/CVE-2023-6909.yaml:94ea35c6bc6b26b7428c58fc6b3c484387d5cc7c
http/cves/2023/CVE-2023-6977.yaml:5f16b7bdb7c8c98ab5e1c333cffaccbb4fbe51ae
http/cves/2023/CVE-2023-7028.yaml:16a6a22a93bf8caea281ec34d32def83f8e06fac
@ -7961,7 +7961,7 @@ ssl/tls-version.yaml:4e40f08efbb39172b9280ea9e26ca5f0a14a575a
ssl/untrusted-root-certificate.yaml:a91d36990a1d052f5ee64d170ad8f084d38dab19
ssl/weak-cipher-suites.yaml:62fe808d9dfafda67c410e6cb9445fdc70257e89
ssl/wildcard-tls.yaml:f1d29ec45ddad271d388c2e8fc28026fc24a04a4
templates-checksum.txt:3ebd45a95cc3e006c20c1e286aad3094a4d0f605
templates-checksum.txt:66557774fbf12aba6454c28d3aa06d29ac8ed5b6
wappalyzer-mapping.yml:7f03bd65baacac20c1dc6bbf35ff2407959574f1
workflows/74cms-workflow.yaml:bb010e767ad32b906153e36ea618be545b4e22d0
workflows/acrolinx-workflow.yaml:8434089bb55dec3d7b2ebc6a6f340e73382dd0c4