chore: generate templates checksum 🤖

patch-10
ghost 2024-08-16 21:25:20 +00:00
parent f5657e4f36
commit b765419f8f
1 changed files with 6 additions and 4 deletions

View File

@ -224,8 +224,8 @@ code/privilege-escalation/linux/rw-sudoers.yaml:f974b1d1a68fd7a8cd24b6f1b61855dd
code/privilege-escalation/linux/sudo-nopasswd.yaml:3117c141f35b9229b6ebe1db10a4fef77aa6ee17
code/privilege-escalation/linux/writable-etc-passwd.yaml:c0ad4796f42aab9c901b52b52b91940172d070e9
contributors.json:951e2ab8bbae42da01f52da9ef0a14ce7f17e159
cves.json:408b81aa5aa82a4fec4485dd59dc0bed31f6c7e5
cves.json-checksum.txt:412d213b89c992ba9e8b2d117d85fe32c53608b6
cves.json:7e4c68279fdec2a5616843b3ab0b33d43367801d
cves.json-checksum.txt:04283905fedcccb1e5746f4010a12c3aabf434ac
dast/cves/2018/CVE-2018-19518.yaml:3407e99af553fe5bdb0ffc001a4132e169c55730
dast/cves/2021/CVE-2021-45046.yaml:a52633e88957969fb09969be45c0a8606ee3d752
dast/cves/2022/CVE-2022-34265.yaml:e006df0567f928e43d40050f55d5928a3fbff17e
@ -3510,6 +3510,7 @@ http/cves/2024/CVE-2024-3742.yaml:c14a1c00e621d1d77ddf978af6680fc4b05c3aa1
http/cves/2024/CVE-2024-37843.yaml:bc236163373e7c3621139f152cb99b39b9a231c7
http/cves/2024/CVE-2024-37881.yaml:060af3bf51e4ab05684d4923658d02b3c49583bb
http/cves/2024/CVE-2024-3822.yaml:2dd9c56b09c0619afb49b80cbcb5979b3eae5a1c
http/cves/2024/CVE-2024-38288.yaml:3dfe843958dc75729b239fa8ed5af6eb930efe41
http/cves/2024/CVE-2024-38289.yaml:fc8b321f6b565cc6feea194cb9265ff81d325e09
http/cves/2024/CVE-2024-38856.yaml:8a878f84e3ad35df5f34f09b30de36bafca17343
http/cves/2024/CVE-2024-3922.yaml:768a5cb24e6893fee27193eda765eeeaedae2a21
@ -6894,7 +6895,7 @@ http/takeovers/announcekit-takeover.yaml:46a92c92d99548d9ac298ab6915496f61ea1dec
http/takeovers/aws-bucket-takeover.yaml:770a292dd17881dfae48ae42c559224087da1a51
http/takeovers/bigcartel-takeover.yaml:6b6d984ae0ea7a8fee936b78e6f58602bc2aa752
http/takeovers/bitbucket-takeover.yaml:2f92c0964d622bb2df9658b0cdb38941498b313c
http/takeovers/campaignmonitor-takeover.yaml:b60c147334081dbeb05f62cb6754a398afbb78ca
http/takeovers/campaignmonitor-takeover.yaml:e526255898bd5270b3b2e69399e18b3011b2b598
http/takeovers/canny-takeover.yaml:cc3ffa83968ffcdef21efa9cbe7ab7e2af48758f
http/takeovers/cargo-takeover.yaml:4df841f476659fa681a2aed2a6d3ca638afcd6d5
http/takeovers/cargocollective-takeover.yaml:d30660c29951ff1a251db9f41f4c283c64590a3a
@ -8808,6 +8809,7 @@ network/c2/darktrack-rat-trojan.yaml:87d27aa07133993bc44f0410eafb1385446c6020
network/c2/orcus-rat-trojan.yaml:391539519819acb2999e30b98fbd9d789c6395ae
network/c2/xtremerat-trojan.yaml:151641a9689c4eb7ce5e61f3b54656c69afc7895
network/cves/2001/CVE-2001-1473.yaml:febab57b73d417adcee7535327476a56b072adb4
network/cves/2004/CVE-2004-2687.yaml:f4704dba96ae7483357919e02b5b1178e500de3e
network/cves/2011/CVE-2011-2523.yaml:39eba544ecf40cd742e5042c18c9f28b07d73c58
network/cves/2015/CVE-2015-3306.yaml:9f687f191fa20b97861ec04cb5acfe798248f611
network/cves/2016/CVE-2016-2004.yaml:19c23411a63774a87b8e604d0bf08fe083eb1614
@ -8983,7 +8985,7 @@ ssl/tls-version.yaml:4e40f08efbb39172b9280ea9e26ca5f0a14a575a
ssl/untrusted-root-certificate.yaml:a91d36990a1d052f5ee64d170ad8f084d38dab19
ssl/weak-cipher-suites.yaml:62fe808d9dfafda67c410e6cb9445fdc70257e89
ssl/wildcard-tls.yaml:d244f62c7bd22d3868fc6fc7cb9550af6b261210
templates-checksum.txt:89a4e19b42cc634941a3f5cb73a38931c6330ce0
templates-checksum.txt:0fd77ae7154b77564bbad4981cec4d1970802dd0
wappalyzer-mapping.yml:7f03bd65baacac20c1dc6bbf35ff2407959574f1
workflows/74cms-workflow.yaml:bb010e767ad32b906153e36ea618be545b4e22d0
workflows/acrolinx-workflow.yaml:8434089bb55dec3d7b2ebc6a6f340e73382dd0c4