added content type #165
Workflow file for this run
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
name: Sync Repositories Workflow | |
on: | |
push: | |
paths: | |
- '.new-additions' | |
- 'headless/2024/CVE-2024-38526.yaml' | |
- 'http/cnvd/2023/CNVD-2023-72138.yaml' | |
- 'http/cves/2022/CVE-2022-38322.yaml' | |
- 'http/cves/2022/CVE-2022-45269.yaml' | |
- 'http/cves/2023/CVE-2023-2309.yaml' | |
- 'http/cves/2023/CVE-2023-29204.yaml' | |
- 'http/cves/2023/CVE-2023-4220.yaml' | |
- 'http/cves/2023/CVE-2023-43662.yaml' | |
- 'http/cves/2023/CVE-2023-44012.yaml' | |
- 'http/cves/2023/CVE-2023-4450.yaml' | |
- 'http/cves/2023/CVE-2023-48728.yaml' | |
- 'http/cves/2024/CVE-2024-1512.yaml' | |
- 'http/cves/2024/CVE-2024-2330.yaml' | |
- 'http/cves/2024/CVE-2024-32238.yaml' | |
- 'http/cves/2024/CVE-2024-34257.yaml' | |
- 'http/cves/2024/CVE-2024-34351.yaml' | |
- 'http/cves/2024/CVE-2024-3742.yaml' | |
- 'http/cves/2024/CVE-2024-40348.yaml' | |
- 'http/cves/2024/CVE-2024-4257.yaml' | |
- 'http/cves/2024/CVE-2024-4879.yaml' | |
- 'http/cves/2024/CVE-2024-4885.yaml' | |
- 'http/cves/2024/CVE-2024-5217.yaml' | |
- 'http/cves/2024/CVE-2024-6289.yaml' | |
- 'http/cves/2024/CVE-2024-6646.yaml' | |
- 'http/default-logins/deluge/deluge-default-login.yaml' | |
- 'http/default-logins/gitblit/gitblit-default-login.yaml' | |
- 'http/default-logins/netflow/netflow-default-login.yaml' | |
- 'http/exposed-panels/adguard-panel.yaml' | |
- 'http/exposed-panels/falcosidekick-panel.yaml' | |
- 'http/exposed-panels/freshrss-panel.yaml' | |
- 'http/exposed-panels/gradle/gradle-develocity-panel.yaml' | |
- 'http/exposed-panels/hal-management-panel.yaml' | |
- 'http/exposed-panels/netflow-analyzer-panel.yaml' | |
- 'http/exposed-panels/tomcat/tomcat-exposed.yaml' | |
- 'http/exposures/configs/apache-ozone-conf.yaml' | |
- 'http/exposures/configs/snoop-servlet-exposure.yaml' | |
- 'http/exposures/files/adcs-certificate.yaml' | |
- 'http/misconfiguration/freshrss-unauth.yaml' | |
- 'http/misconfiguration/installer/adguard-installer.yaml' | |
- 'http/misconfiguration/installer/freshrss-installer.yaml' | |
- 'http/misconfiguration/mongod-exposure.yaml' | |
- 'http/misconfiguration/servicenow-title-injection.yaml' | |
- 'http/misconfiguration/sftpgo-admin-setup.yaml' | |
- 'http/technologies/apache/apache-ozone-detect.yaml' | |
- 'http/technologies/wordpress/plugins/fluent-smtp.yaml' | |
- 'http/technologies/wordpress/plugins/wp-crontrol.yaml' | |
- 'http/vulnerabilities/nextjs/nextjs-middleware-cache.yaml' | |
- 'http/vulnerabilities/nextjs/nextjs-rsc-cache.yaml' | |
- 'http/vulnerabilities/other/jan-file-upload.yaml' | |
- 'http/vulnerabilities/other/lvs-download-lfi.yaml' | |
- 'http/vulnerabilities/other/ncast-lfi.yaml' | |
- 'http/vulnerabilities/other/wifisky7-rce.yaml' | |
- 'network/cves/2024/CVE-2024-6746.yaml' | |
- 'vulnerabilities/thinkphp/thinkphp6-arbitrary-write.yaml' | |
- 'workflows/nacos-workflow.yaml' | |
workflow_dispatch: | |
jobs: | |
triggerRemoteWorkflow: | |
if: github.repository == 'projectdiscovery/nuclei-templates' | |
runs-on: ubuntu-latest | |
steps: | |
- name: Trigger Remote Workflow with curl | |
run: | | |
curl -i -s -k -X 'POST' -H 'Host: api.github.com' -H "Authorization: token ${{ secrets.GTOKEN }}" --data-binary $'{\"ref\":\"main\"}' 'https://api.github.com/repos/projectdiscovery/early-templates/actions/workflows/reposync.yml/dispatches' |