From c50a370401e267ea6da75ad565e614d99544d0a2 Mon Sep 17 00:00:00 2001 From: ghost Date: Mon, 26 Jan 2026 12:34:58 +0000 Subject: [PATCH] =?UTF-8?q?chore:=20sign=20templates=20=F0=9F=A4=96?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit --- file/logs/aspnet-framework-exceptions.yaml | 2 +- file/logs/nodejs-framework-exceptions.yaml | 2 +- http/osint/phishing/coinbase-phish.yaml | 2 +- http/technologies/hotjar-rum-detect.yaml | 2 +- http/vulnerabilities/yonyou/yonyou-nc-lfi.yaml | 2 +- network/detection/unauth-java-message-broker-detect.yaml | 2 +- 6 files changed, 6 insertions(+), 6 deletions(-) diff --git a/file/logs/aspnet-framework-exceptions.yaml b/file/logs/aspnet-framework-exceptions.yaml index a17dd30f384..ac8214c22c2 100644 --- a/file/logs/aspnet-framework-exceptions.yaml +++ b/file/logs/aspnet-framework-exceptions.yaml @@ -22,4 +22,4 @@ file: - 'InvalidOperationException' - 'UnauthorizedAccessException' - 'NotFound' -# digest: 490a00463044022041790b2e83b057c3f6373abb1771d023302ad4cbe74e824ddd29acfc0f5c3dfb022076e01efda14497b993a2f3b378d53e33a807975006b5de01c3980ea67f6165d0:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a00483046022100f7cb5eee0dbe3ef9abd2e897d2a9466112c099ca1ac15ecf690ea2118b3edbc9022100e87e1946c01698936506af6a5a319d655f27a565433a4ebb58e5b9e63e547fdd:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/file/logs/nodejs-framework-exceptions.yaml b/file/logs/nodejs-framework-exceptions.yaml index ba5f9605f4b..03c3caae34c 100644 --- a/file/logs/nodejs-framework-exceptions.yaml +++ b/file/logs/nodejs-framework-exceptions.yaml @@ -30,4 +30,4 @@ file: - 'BadRequestError' - 'MongoError' - 'SequelizeDatabaseError' -# digest: 4a0a00473045022036d898dc633756c3e5b653624d99de725858ca59654f007d411085090d245a55022100a9a277996cd98b16f036a71c1b0475b6178eb0ff749e88d47e4c837baf0ee824:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a00483046022100971ac692adc41ffbbe980d92cd76e3ee85ea5aaf6ae710954a449d966a2c62de022100ed30f2a7be44b56418c626bb91e79c8dfb2319fc7382793a2938fac7623cac07:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/osint/phishing/coinbase-phish.yaml b/http/osint/phishing/coinbase-phish.yaml index b09675be505..8a148635a7f 100644 --- a/http/osint/phishing/coinbase-phish.yaml +++ b/http/osint/phishing/coinbase-phish.yaml @@ -48,4 +48,4 @@ http: dsl: - '!contains(host,"coinbase.com")' - '!contains(host,"coinbase.co")' -# digest: 4a0a00473045022100a9cbbbd4db6a5a367009e35e881318824aaca199b35b7eacf382cb89d2a7cf010220221aa680af0ad74301f8c0830a7a9b354856283360cb8a785f685422da6b828c:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022100f7b813299d62ac6be88cdb094ae5158ccd9e39d17fd7a540e4101c0da275801d022022451df9cd38e6729e453af0b33c1c2273ab3fc318a45b00d9d8b8a360c37db4:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/technologies/hotjar-rum-detect.yaml b/http/technologies/hotjar-rum-detect.yaml index b611c5d7eae..6ab17c5dde2 100644 --- a/http/technologies/hotjar-rum-detect.yaml +++ b/http/technologies/hotjar-rum-detect.yaml @@ -40,4 +40,4 @@ http: - "window\\.hj\\s*=\\s*window\\.hj\\s*\\|\\|" - "\\(function\\s*\\([^)]*\\)\\s*\\{[^}]*hotjar[^}]*hjid" condition: or -# digest: 4a0a00473045022100dd0fbc932fbfbc0d5fa6d35d9411e1bc5e7f839565473d9891a3fa894c9d76af0220790d4cb5a12604f714a86cd3d8c9d36d6adbc6bbc2eb22b90160023097cc5b0e:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022100c8e636665e759407af827f9d2570ef23b8eba46ef37de7c7ebb5ffada5fd3281022005b0adbb51012cffbe8508c55acf8b3348732d4ff6bc30c88e730b6642a862ce:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/vulnerabilities/yonyou/yonyou-nc-lfi.yaml b/http/vulnerabilities/yonyou/yonyou-nc-lfi.yaml index 8f10e67ca9b..59c5ef75ff1 100644 --- a/http/vulnerabilities/yonyou/yonyou-nc-lfi.yaml +++ b/http/vulnerabilities/yonyou/yonyou-nc-lfi.yaml @@ -33,4 +33,4 @@ http: - 'contains(content_type, "application/xml")' - 'contains_all(body, "