Update CVE-2023-38203.yaml #57
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
name: Sync Repositories Workflow | |
on: | |
push: | |
paths: | |
- '.new-additions' | |
- 'http/cnvd/2023/CNVD-2023-96945.yaml' | |
- 'http/cves/2015/CVE-2015-1635.yaml' | |
- 'http/cves/2023/CVE-2023-38203.yaml' | |
- 'http/cves/2023/CVE-2023-42344.yaml' | |
- 'http/cves/2023/CVE-2023-45671.yaml' | |
- 'http/cves/2023/CVE-2023-48777.yaml' | |
- 'http/cves/2023/CVE-2023-6895.yaml' | |
- 'http/cves/2024/CVE-2024-0305.yaml' | |
- 'http/cves/2024/CVE-2024-0713.yaml' | |
- 'http/cves/2024/CVE-2024-1021.yaml' | |
- 'http/cves/2024/CVE-2024-1071.yaml' | |
- 'http/cves/2024/CVE-2024-1208.yaml' | |
- 'http/cves/2024/CVE-2024-1209.yaml' | |
- 'http/cves/2024/CVE-2024-1210.yaml' | |
- 'http/cves/2024/CVE-2024-1709.yaml' | |
- 'http/cves/2024/CVE-2024-22319.yaml' | |
- 'http/cves/2024/CVE-2024-22320.yaml' | |
- 'http/cves/2024/CVE-2024-23334.yaml' | |
- 'http/cves/2024/CVE-2024-25600.yaml' | |
- 'http/cves/2024/CVE-2024-27198.yaml' | |
- 'http/cves/2024/CVE-2024-27199.yaml' | |
- 'http/cves/2024/CVE-2024-27497.yaml' | |
- 'http/default-logins/ibm/ibm-dcbc-default-login.yaml' | |
- 'http/default-logins/ibm/ibm-dcec-default-login.yaml' | |
- 'http/default-logins/ibm/ibm-dsc-default-login.yaml' | |
- 'http/default-logins/ibm/ibm-hmc-default-login.yaml' | |
- 'http/default-logins/ibm/imm-default-login.yaml' | |
- 'http/default-logins/lucee/lucee-default-login.yaml' | |
- 'http/exposed-panels/c2/meduza-stealer.yaml' | |
- 'http/exposed-panels/cisco-unity-panel.yaml' | |
- 'http/exposed-panels/connectwise-panel.yaml' | |
- 'http/exposed-panels/fortinet/fortiauthenticator-detect.yaml' | |
- 'http/exposed-panels/ibm/ibm-dcec-panel.yaml' | |
- 'http/exposed-panels/ibm/ibm-decision-server-console.yaml' | |
- 'http/exposed-panels/ibm/ibm-odm-panel.yaml' | |
- 'http/exposed-panels/koel-panel.yaml' | |
- 'http/exposed-panels/kopano-webapp-panel.yaml' | |
- 'http/exposed-panels/linshare-panel.yaml' | |
- 'http/exposed-panels/openvas-panel.yaml' | |
- 'http/exposed-panels/opinio-panel.yaml' | |
- 'http/exposed-panels/redmine-panel.yaml' | |
- 'http/exposed-panels/rocketchat-panel.yaml' | |
- 'http/exposed-panels/webtransfer-client-panel.yaml' | |
- 'http/exposures/configs/sphinxsearch-config.yaml' | |
- 'http/exposures/tokens/dependency/dependency-track-api.yaml' | |
- 'http/exposures/tokens/docker/docker-hub-pat.yaml' | |
- 'http/exposures/tokens/doppler/doppler-audit-token.yaml' | |
- 'http/exposures/tokens/doppler/doppler-cli-token.yaml' | |
- 'http/exposures/tokens/doppler/doppler-scim-token.yaml' | |
- 'http/exposures/tokens/doppler/doppler-service-account-token.yaml' | |
- 'http/exposures/tokens/doppler/doppler-service-token.yaml' | |
- 'http/exposures/tokens/dropbox/dropbox-access-token.yaml' | |
- 'http/exposures/tokens/huggingface/huggingface-user-access-token.yaml' | |
- 'http/exposures/tokens/linkedin/linkedin-client-id.yaml' | |
- 'http/exposures/tokens/linkedin/linkedin-secret-key.yaml' | |
- 'http/exposures/tokens/newrelic/newrelic-api-service-key.yaml' | |
- 'http/exposures/tokens/newrelic/newrelic-license-key-non.yaml' | |
- 'http/exposures/tokens/newrelic/newrelic-license-key.yaml' | |
- 'http/exposures/tokens/odbc/odbc-connection-string.yaml' | |
- 'http/exposures/tokens/okta/okta-api-token.yaml' | |
- 'http/exposures/tokens/particle/particle-access-token.yaml' | |
- 'http/exposures/tokens/react/react-app-password.yaml' | |
- 'http/exposures/tokens/react/react-app-username.yaml' | |
- 'http/exposures/tokens/salesforce/salesforce-access-token.yaml' | |
- 'http/exposures/tokens/thingsboard/thingsboard-access-token.yaml' | |
- 'http/exposures/tokens/truenas/truenas-api-key.yaml' | |
- 'http/exposures/tokens/twitter/twitter-client-id.yaml' | |
- 'http/exposures/tokens/twitter/twitter-secret-key.yaml' | |
- 'http/exposures/tokens/wireguard/wireguard-preshared-key.yaml' | |
- 'http/exposures/tokens/wireguard/wireguard-private-key.yaml' | |
- 'http/miscellaneous/maxforwards-headers-detect.yaml' | |
- 'http/misconfiguration/cloudflare-rocketloader-htmli.yaml' | |
- 'http/misconfiguration/installer/connectwise-setup.yaml' | |
- 'http/technologies/ibm/ibm-decision-runner.yaml' | |
- 'http/technologies/ibm/ibm-decision-server-runtime.yaml' | |
- 'http/technologies/ibm/ibm-odm-detect.yaml' | |
- 'http/technologies/pexip-detect.yaml' | |
- 'http/vulnerabilities/chanjet-tplus/chanjet-tplus-unauth-update.yaml' | |
- 'http/vulnerabilities/dahua/dahua-bitmap-fileupload.yaml' | |
- 'http/vulnerabilities/joomla/joomla-easyshop-lfi.yaml' | |
- 'http/vulnerabilities/other/lucee-unset-credentials.yaml' | |
- 'http/vulnerabilities/yonyou/yonyou-ufida-nc-lfi.yaml' | |
workflow_dispatch: | |
jobs: | |
triggerRemoteWorkflow: | |
if: github.repository == 'projectdiscovery/nuclei-templates' | |
runs-on: ubuntu-latest | |
steps: | |
- name: Trigger Remote Workflow with curl | |
run: | | |
curl -i -s -k -X 'POST' -H 'Host: api.github.com' -H "Authorization: token ${{ secrets.GTOKEN }}" --data-binary $'{\"ref\":\"main\"}' 'https://api.github.com/repos/projectdiscovery/early-templates/actions/workflows/reposync.yml/dispatches' |