From bdbb7a1b1e2f5d0cb14af1151e098f7e25f1008c Mon Sep 17 00:00:00 2001 From: ghost Date: Wed, 26 Nov 2025 10:44:15 +0000 Subject: [PATCH] =?UTF-8?q?chore:=20sign=20templates=20=F0=9F=A4=96?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit --- dast/vulnerabilities/sqli/sqli-error-based.yaml | 2 +- file/logs/aspnet-framework-exceptions.yaml | 2 +- file/logs/nodejs-framework-exceptions.yaml | 2 +- http/miscellaneous/crypto-address-detect.yaml | 2 +- http/vulnerabilities/yonyou/yonyou-nc-lfi.yaml | 2 +- network/detection/unauth-java-message-broker-detect.yaml | 2 +- 6 files changed, 6 insertions(+), 6 deletions(-) diff --git a/dast/vulnerabilities/sqli/sqli-error-based.yaml b/dast/vulnerabilities/sqli/sqli-error-based.yaml index df1b4709934..ca1a5cdc190 100644 --- a/dast/vulnerabilities/sqli/sqli-error-based.yaml +++ b/dast/vulnerabilities/sqli/sqli-error-based.yaml @@ -494,4 +494,4 @@ http: - "SQ200: No table " - "Virtuoso S0002 Error" - "\\[(Virtuoso Driver|Virtuoso iODBC Driver)\\]\\[Virtuoso Server\\]" -# digest: 4b0a00483046022100fc7880d1ba52b68e380ae499d88bfb728689d1f8cf19a0b3614da15cff736951022100b90853b96511c04b6ca8fd4ebeaa539b9a100804e46acb3f5beb203f2ff7e575:922c64590222798bb761d5b6d8e72950 +# digest: 4a0a00473045022100b3102693f70190b12ccb6f15140a61b65dd91c218b1e3ea99ea59e75ad8f03170220211591503e0603405ab968f481fb3f615c7c3deb8f5849ac281640b5011fcb30:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/file/logs/aspnet-framework-exceptions.yaml b/file/logs/aspnet-framework-exceptions.yaml index d8da609e54f..10755d990e3 100644 --- a/file/logs/aspnet-framework-exceptions.yaml +++ b/file/logs/aspnet-framework-exceptions.yaml @@ -22,4 +22,4 @@ file: - 'InvalidOperationException' - 'UnauthorizedAccessException' - 'NotFound' -# digest: 4b0a00483046022100b5b0a613436b004833db4d544f8cc6725180e842ad7d321d97f96b842a41fc7f022100b997d6ce3befd41442d241c9490ad832b6a669974739246fc7e07f832c835b22:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a00463044022070268de7f010470ac17a28e7d318df7f155fa3a64176ea8cb6b78acd1be130560220785ae875ada257834e0e010ffa99a1fbab686057c0a4c57494be30a5cdcaf203:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/file/logs/nodejs-framework-exceptions.yaml b/file/logs/nodejs-framework-exceptions.yaml index 227a5ea91ae..91ecad4328d 100644 --- a/file/logs/nodejs-framework-exceptions.yaml +++ b/file/logs/nodejs-framework-exceptions.yaml @@ -30,4 +30,4 @@ file: - 'BadRequestError' - 'MongoError' - 'SequelizeDatabaseError' -# digest: 490a00463044022079b535ff6f389aa087ea28a074a8be1eb190509616a7c57f56a87f7ef6bda67902202f17963f6425fd270fe1950f963a0b095a3ed64e08eef0dff5d153c2cb70f7b4:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a0047304502206072c8bbfb3dabee21f3d843701488c2b1b0a898f858dc9dbcdd8f39768caba8022100a9cf7f488f1e458dc99aaff11c11eefd8310864e7c01737bca9d271ced82db26:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/miscellaneous/crypto-address-detect.yaml b/http/miscellaneous/crypto-address-detect.yaml index 88d7d2038b2..742849c9191 100644 --- a/http/miscellaneous/crypto-address-detect.yaml +++ b/http/miscellaneous/crypto-address-detect.yaml @@ -49,4 +49,4 @@ http: - 'regex("(r[0-9a-zA-Z]{24,34})", body)' - 'status_code == 200' condition: and -# digest: 4a0a00473045022100e82bafddf2fbbb5b861fb14034e477eefce384d4d836dc284d5de11b5868e483022002a4f0ba534f9ebbaae60f6ecb26a269b1679c1899a5e864746953ca0e3e39cd:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022048fdc5d7e982801d85799588af3ede14e9ce408f5f893c8531efb631f7e87416022100bea5763f4b8df42608a3277849511b84662fb142a05049af60897b2a97a1d12d:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/vulnerabilities/yonyou/yonyou-nc-lfi.yaml b/http/vulnerabilities/yonyou/yonyou-nc-lfi.yaml index 5fa30a64020..68fae147bd3 100644 --- a/http/vulnerabilities/yonyou/yonyou-nc-lfi.yaml +++ b/http/vulnerabilities/yonyou/yonyou-nc-lfi.yaml @@ -33,4 +33,4 @@ http: - 'contains(content_type, "application/xml")' - 'contains_all(body, "