diff --git a/templates-checksum.txt b/templates-checksum.txt index 683d2132ba..3a19f87635 100644 --- a/templates-checksum.txt +++ b/templates-checksum.txt @@ -224,8 +224,8 @@ code/privilege-escalation/linux/rw-sudoers.yaml:f974b1d1a68fd7a8cd24b6f1b61855dd code/privilege-escalation/linux/sudo-nopasswd.yaml:3117c141f35b9229b6ebe1db10a4fef77aa6ee17 code/privilege-escalation/linux/writable-etc-passwd.yaml:c0ad4796f42aab9c901b52b52b91940172d070e9 contributors.json:951e2ab8bbae42da01f52da9ef0a14ce7f17e159 -cves.json:408b81aa5aa82a4fec4485dd59dc0bed31f6c7e5 -cves.json-checksum.txt:412d213b89c992ba9e8b2d117d85fe32c53608b6 +cves.json:7e4c68279fdec2a5616843b3ab0b33d43367801d +cves.json-checksum.txt:04283905fedcccb1e5746f4010a12c3aabf434ac dast/cves/2018/CVE-2018-19518.yaml:3407e99af553fe5bdb0ffc001a4132e169c55730 dast/cves/2021/CVE-2021-45046.yaml:a52633e88957969fb09969be45c0a8606ee3d752 dast/cves/2022/CVE-2022-34265.yaml:e006df0567f928e43d40050f55d5928a3fbff17e @@ -3510,6 +3510,7 @@ http/cves/2024/CVE-2024-3742.yaml:c14a1c00e621d1d77ddf978af6680fc4b05c3aa1 http/cves/2024/CVE-2024-37843.yaml:bc236163373e7c3621139f152cb99b39b9a231c7 http/cves/2024/CVE-2024-37881.yaml:060af3bf51e4ab05684d4923658d02b3c49583bb http/cves/2024/CVE-2024-3822.yaml:2dd9c56b09c0619afb49b80cbcb5979b3eae5a1c +http/cves/2024/CVE-2024-38288.yaml:3dfe843958dc75729b239fa8ed5af6eb930efe41 http/cves/2024/CVE-2024-38289.yaml:fc8b321f6b565cc6feea194cb9265ff81d325e09 http/cves/2024/CVE-2024-38856.yaml:8a878f84e3ad35df5f34f09b30de36bafca17343 http/cves/2024/CVE-2024-3922.yaml:768a5cb24e6893fee27193eda765eeeaedae2a21 @@ -6894,7 +6895,7 @@ http/takeovers/announcekit-takeover.yaml:46a92c92d99548d9ac298ab6915496f61ea1dec http/takeovers/aws-bucket-takeover.yaml:770a292dd17881dfae48ae42c559224087da1a51 http/takeovers/bigcartel-takeover.yaml:6b6d984ae0ea7a8fee936b78e6f58602bc2aa752 http/takeovers/bitbucket-takeover.yaml:2f92c0964d622bb2df9658b0cdb38941498b313c -http/takeovers/campaignmonitor-takeover.yaml:b60c147334081dbeb05f62cb6754a398afbb78ca +http/takeovers/campaignmonitor-takeover.yaml:e526255898bd5270b3b2e69399e18b3011b2b598 http/takeovers/canny-takeover.yaml:cc3ffa83968ffcdef21efa9cbe7ab7e2af48758f http/takeovers/cargo-takeover.yaml:4df841f476659fa681a2aed2a6d3ca638afcd6d5 http/takeovers/cargocollective-takeover.yaml:d30660c29951ff1a251db9f41f4c283c64590a3a @@ -8808,6 +8809,7 @@ network/c2/darktrack-rat-trojan.yaml:87d27aa07133993bc44f0410eafb1385446c6020 network/c2/orcus-rat-trojan.yaml:391539519819acb2999e30b98fbd9d789c6395ae network/c2/xtremerat-trojan.yaml:151641a9689c4eb7ce5e61f3b54656c69afc7895 network/cves/2001/CVE-2001-1473.yaml:febab57b73d417adcee7535327476a56b072adb4 +network/cves/2004/CVE-2004-2687.yaml:f4704dba96ae7483357919e02b5b1178e500de3e network/cves/2011/CVE-2011-2523.yaml:39eba544ecf40cd742e5042c18c9f28b07d73c58 network/cves/2015/CVE-2015-3306.yaml:9f687f191fa20b97861ec04cb5acfe798248f611 network/cves/2016/CVE-2016-2004.yaml:19c23411a63774a87b8e604d0bf08fe083eb1614 @@ -8983,7 +8985,7 @@ ssl/tls-version.yaml:4e40f08efbb39172b9280ea9e26ca5f0a14a575a ssl/untrusted-root-certificate.yaml:a91d36990a1d052f5ee64d170ad8f084d38dab19 ssl/weak-cipher-suites.yaml:62fe808d9dfafda67c410e6cb9445fdc70257e89 ssl/wildcard-tls.yaml:d244f62c7bd22d3868fc6fc7cb9550af6b261210 -templates-checksum.txt:89a4e19b42cc634941a3f5cb73a38931c6330ce0 +templates-checksum.txt:0fd77ae7154b77564bbad4981cec4d1970802dd0 wappalyzer-mapping.yml:7f03bd65baacac20c1dc6bbf35ff2407959574f1 workflows/74cms-workflow.yaml:bb010e767ad32b906153e36ea618be545b4e22d0 workflows/acrolinx-workflow.yaml:8434089bb55dec3d7b2ebc6a6f340e73382dd0c4