chore: generate templates checksum 🤖

patch-12
ghost 2024-09-21 14:40:53 +00:00
parent 26506fa1ce
commit f095852ce5
1 changed files with 6 additions and 5 deletions

View File

@ -416,8 +416,8 @@ code/privilege-escalation/linux/rw-sudoers.yaml:f974b1d1a68fd7a8cd24b6f1b61855dd
code/privilege-escalation/linux/sudo-nopasswd.yaml:3117c141f35b9229b6ebe1db10a4fef77aa6ee17 code/privilege-escalation/linux/sudo-nopasswd.yaml:3117c141f35b9229b6ebe1db10a4fef77aa6ee17
code/privilege-escalation/linux/writable-etc-passwd.yaml:c0ad4796f42aab9c901b52b52b91940172d070e9 code/privilege-escalation/linux/writable-etc-passwd.yaml:c0ad4796f42aab9c901b52b52b91940172d070e9
contributors.json:951e2ab8bbae42da01f52da9ef0a14ce7f17e159 contributors.json:951e2ab8bbae42da01f52da9ef0a14ce7f17e159
cves.json:e35aa9edecd0526195d7c41a8897ecf06dbfd881 cves.json:441f9d05ed22e3d31621b0ae12a16189dee5db04
cves.json-checksum.txt:2979b31a09622982befee0a1247af604351abf8e cves.json-checksum.txt:a01b29e11765ceeeeb2cc8887ccabb3d21f928d8
dast/cves/2018/CVE-2018-19518.yaml:3407e99af553fe5bdb0ffc001a4132e169c55730 dast/cves/2018/CVE-2018-19518.yaml:3407e99af553fe5bdb0ffc001a4132e169c55730
dast/cves/2021/CVE-2021-45046.yaml:a52633e88957969fb09969be45c0a8606ee3d752 dast/cves/2021/CVE-2021-45046.yaml:a52633e88957969fb09969be45c0a8606ee3d752
dast/cves/2022/CVE-2022-34265.yaml:e006df0567f928e43d40050f55d5928a3fbff17e dast/cves/2022/CVE-2022-34265.yaml:e006df0567f928e43d40050f55d5928a3fbff17e
@ -3611,7 +3611,7 @@ http/cves/2023/CVE-2023-6444.yaml:0a82a1e5e41a83c6ca66177c063a3ea95cc0171f
http/cves/2023/CVE-2023-6505.yaml:84f672dbc2f01d602f46205dd57f62f15dc0e8ed http/cves/2023/CVE-2023-6505.yaml:84f672dbc2f01d602f46205dd57f62f15dc0e8ed
http/cves/2023/CVE-2023-6553.yaml:7a54271ce0dabed297718787b829f3ddc52b256c http/cves/2023/CVE-2023-6553.yaml:7a54271ce0dabed297718787b829f3ddc52b256c
http/cves/2023/CVE-2023-6567.yaml:0a7fedde7ec2ac7ec9fc65018c7dd3359d9f0fa7 http/cves/2023/CVE-2023-6567.yaml:0a7fedde7ec2ac7ec9fc65018c7dd3359d9f0fa7
http/cves/2023/CVE-2023-6568.yaml:73b9fdf724cc1410560d2bc69853148c0814e15e http/cves/2023/CVE-2023-6568.yaml:d5ad024fe0db18fb7abafc3ee7ab29c8e86abb14
http/cves/2023/CVE-2023-6623.yaml:00d70a24f04c9124d433cb202bbe6d5feac8db68 http/cves/2023/CVE-2023-6623.yaml:00d70a24f04c9124d433cb202bbe6d5feac8db68
http/cves/2023/CVE-2023-6634.yaml:7d6b2f13c31512686f5c947bca522a303557ab7b http/cves/2023/CVE-2023-6634.yaml:7d6b2f13c31512686f5c947bca522a303557ab7b
http/cves/2023/CVE-2023-6786.yaml:6cb37423babfd031e76f3b1d59b8f231c968f2af http/cves/2023/CVE-2023-6786.yaml:6cb37423babfd031e76f3b1d59b8f231c968f2af
@ -3841,7 +3841,7 @@ http/cves/2024/CVE-2024-7954.yaml:2e36972b077a61133a6a6a3227ae4101b69c3a36
http/cves/2024/CVE-2024-8181.yaml:c571c26419e2cec8e67338cf377248d6b45c0f60 http/cves/2024/CVE-2024-8181.yaml:c571c26419e2cec8e67338cf377248d6b45c0f60
http/cves/2024/CVE-2024-8503.yaml:08fce8a25057c938584c9961eff1c3e85895aeb9 http/cves/2024/CVE-2024-8503.yaml:08fce8a25057c938584c9961eff1c3e85895aeb9
http/cves/2024/CVE-2024-8517.yaml:640de66acc51d345455036b12592362ed66f3aa7 http/cves/2024/CVE-2024-8517.yaml:640de66acc51d345455036b12592362ed66f3aa7
http/cves/2024/CVE-2024-8522.yaml:e7fd711c239390fd4c9452eda40478e562a8ca86 http/cves/2024/CVE-2024-8522.yaml:c1e0ee310485cd02d4de48d27701753e39c650e3
http/cves/2024/CVE-2024-8752.yaml:f0f9dca783b57c1fd5e47592e224f888d47c1747 http/cves/2024/CVE-2024-8752.yaml:f0f9dca783b57c1fd5e47592e224f888d47c1747
http/default-logins/3com/3Com-wireless-default-login.yaml:80e8ff28f6fe58cd692d51a649e382978ba730c3 http/default-logins/3com/3Com-wireless-default-login.yaml:80e8ff28f6fe58cd692d51a649e382978ba730c3
http/default-logins/3com/3com-nj2000-default-login.yaml:3c260ca4c2ee7809221fc4b9330a540795c081ce http/default-logins/3com/3com-nj2000-default-login.yaml:3c260ca4c2ee7809221fc4b9330a540795c081ce
@ -8580,6 +8580,7 @@ http/vulnerabilities/other/netgear-router-auth-bypass.yaml:031b548982d19f7685bcc
http/vulnerabilities/other/netgear-router-exposure.yaml:d401cd800f11fdd6c0cf6c556a4b61d7589d78f9 http/vulnerabilities/other/netgear-router-exposure.yaml:d401cd800f11fdd6c0cf6c556a4b61d7589d78f9
http/vulnerabilities/other/netgear-wac124-router-auth-bypass.yaml:a82ad04e613b9104f9be98fb4888d8965e9131d3 http/vulnerabilities/other/netgear-wac124-router-auth-bypass.yaml:a82ad04e613b9104f9be98fb4888d8965e9131d3
http/vulnerabilities/other/netis-info-leak.yaml:901277a8b887fe9ff1c8981c1332010d5c7919a1 http/vulnerabilities/other/netis-info-leak.yaml:901277a8b887fe9ff1c8981c1332010d5c7919a1
http/vulnerabilities/other/newcapec-rce.yaml:a841cf05605ddce6975d375c562c84fb0f2a0cd3
http/vulnerabilities/other/news-script-xss.yaml:f106ff5cf78ec4d3b6331090b0bae1242344e58a http/vulnerabilities/other/news-script-xss.yaml:f106ff5cf78ec4d3b6331090b0bae1242344e58a
http/vulnerabilities/other/nextjs-redirect.yaml:07df63f787b363f50e03db957f8cdbec3aa18cb6 http/vulnerabilities/other/nextjs-redirect.yaml:07df63f787b363f50e03db957f8cdbec3aa18cb6
http/vulnerabilities/other/nginx-merge-slashes-path-traversal.yaml:95f29bf05d56360ed303a17dc8245101605a01d1 http/vulnerabilities/other/nginx-merge-slashes-path-traversal.yaml:95f29bf05d56360ed303a17dc8245101605a01d1
@ -9337,7 +9338,7 @@ ssl/tls-version.yaml:4e40f08efbb39172b9280ea9e26ca5f0a14a575a
ssl/untrusted-root-certificate.yaml:a91d36990a1d052f5ee64d170ad8f084d38dab19 ssl/untrusted-root-certificate.yaml:a91d36990a1d052f5ee64d170ad8f084d38dab19
ssl/weak-cipher-suites.yaml:62fe808d9dfafda67c410e6cb9445fdc70257e89 ssl/weak-cipher-suites.yaml:62fe808d9dfafda67c410e6cb9445fdc70257e89
ssl/wildcard-tls.yaml:d244f62c7bd22d3868fc6fc7cb9550af6b261210 ssl/wildcard-tls.yaml:d244f62c7bd22d3868fc6fc7cb9550af6b261210
templates-checksum.txt:0728e3403edcc9e961e4c55480a0d09cf8788efa templates-checksum.txt:156fbd6a160310cab78c318ebae116ee65178b70
wappalyzer-mapping.yml:7f03bd65baacac20c1dc6bbf35ff2407959574f1 wappalyzer-mapping.yml:7f03bd65baacac20c1dc6bbf35ff2407959574f1
workflows/74cms-workflow.yaml:bb010e767ad32b906153e36ea618be545b4e22d0 workflows/74cms-workflow.yaml:bb010e767ad32b906153e36ea618be545b4e22d0
workflows/acrolinx-workflow.yaml:8434089bb55dec3d7b2ebc6a6f340e73382dd0c4 workflows/acrolinx-workflow.yaml:8434089bb55dec3d7b2ebc6a6f340e73382dd0c4