Skip to content

Commit 28d1e63

Browse files
Further validate repos by only accepting ones with tags (#2233)
Tags are necessary for version resolution, and a repo without them is useless to us, and many of the repos in the current denylist do not have any tags. This enables a radical simplification of the repo denylist and largely removes ongoing maintenance burden. Latest run in Production: ``` nvdcve-2.0-2024.json Metrics: {TotalCVEs:11389 CVEsForApplications:1581 CVEsForKnownRepos:2364 OSVRecordsGenerated:1093 Outcomes:map[]} ``` Local test run: ``` nvdcve-2.0-2024.json Metrics: {TotalCVEs:11511 CVEsForApplications:1581 CVEsForKnownRepos:1651 OSVRecordsGenerated:1047 Outcomes:map[]} ``` A fabulous improvement in CVEsForKnownRepos, a much (durably) firmer looking denominator for conversion metrics.
1 parent 50a17d7 commit 28d1e63

4 files changed

Lines changed: 56 additions & 367 deletions

File tree

vulnfeeds/cves/versions.go

Lines changed: 3 additions & 337 deletions
Original file line numberDiff line numberDiff line change
@@ -226,353 +226,19 @@ type CPE struct {
226226
}
227227

228228
var (
229-
// TODO(apollock): read this from an external file
230229
InvalidRepos = []string{
231-
"https://github.com/0day1/g1ory",
232-
"https://github.com/0x14dli/ffos-SQL-injection-vulnerability-exists",
233-
"https://github.com/0xdea/exploits",
234-
"https://github.com/0xQRx/VulnerabilityResearch",
235-
"https://github.com/0xxtoby/Vuldb",
236-
"https://github.com/10cks/inkdropPoc",
237-
"https://github.com/10cksyiqiyinhangzhoutechnology/elf-parser_segments_poc",
238-
"https://github.com/1MurasaKi/Eyewear_Shop_XSS",
239-
"https://github.com/1MurasaKi/PboostCMS_XSS",
240-
"https://github.com/1MurasaKi/PizzeXSS_Report",
241-
"https://github.com/1MurasaKi/STMS_CSRF",
242-
"https://github.com/1s1and123/Vulnerabilities",
243-
"https://github.com/1security/Vulnerability",
244-
"https://github.com/202ecommerce/security-advisories",
245-
"https://github.com/594238758/mycve",
246-
"https://github.com/777erp/cms",
247-
"https://github.com/A-TGAO/MxsDocVul",
248-
"https://github.com/abcdefg-png/IoT-vulnerable",
249-
"https://github.com/abhiunix/goo-blog-App-CVE",
250-
"https://github.com/Accenture/AARO-Bugs",
251-
"https://github.com/active-labs/Advisories",
252-
"https://github.com/ae6e361b/online-job-portal-forget",
253-
"https://github.com/agadient/SERVEEZ-CVE",
254-
"https://github.com/Airrudder/vuls",
255-
"https://github.com/AlwaysHereFight/YZMCMSxss",
256-
"https://github.com/alwentiu/COVIDSafe-CVE-2020-12856",
257-
"https://github.com/anhdq201/rukovoditel",
258-
"https://github.com/anhdq201/webtareas",
259-
"https://github.com/anvilsecure/garmin-ciq-app-research",
260-
"https://github.com/Anza2001/IOT_VULN",
261-
"https://github.com/apriorit/pentesting",
262-
"https://github.com/ArianeBlow/Axelor_Stored_XSS",
263-
"https://github.com/atredispartners/advisories",
264-
"https://github.com/awillix/research",
265-
"https://github.com/b17fr13nds/MPlayer_cve_poc",
266-
"https://github.com/badboycxcc/Student-Admission-Sqlinjection",
267-
"https://github.com/badboycxcc/Student-Admission-Xss",
268-
"https://github.com/beicheng-maker/vulns",
269-
"https://github.com/benjaminpsinclair/netdisco-2023-advisory",
270-
"https://github.com/biantaibao/mldong_RCE",
271-
"https://github.com/biantaibao/octopus_SQL",
272-
"https://github.com/biantaibao/octopus_XSS",
273-
"https://github.com/biantaibao/zhglxt_xss",
274-
"https://github.com/BigTiger2020/2022",
275-
"https://github.com/BigTiger2020/2023-1",
276-
"https://github.com/BigTiger2020/2023",
277-
"https://github.com/BigTiger2020/74CMS",
278-
"https://github.com/BigTiger2020/Fantastic-Blog-CMS-",
279-
"https://github.com/BigTiger2020/Theme-Park-Ticketing-System",
280-
"https://github.com/BigTiger2020/UCMS",
281-
"https://github.com/BlackFan/client-side-prototype-pollution",
282-
"https://github.com/BLL-l/vulnerability_wiki",
283-
"https://github.com/blockomat2100/PoCs",
284-
"https://github.com/bosslabdcu/Vulnerability-Reporting",
285-
"https://github.com/BurakSevben/2024_Math_Game_XSS",
286-
"https://github.com/BurakSevben/2024_Online_Food_Menu_XSS",
287-
"https://github.com/BurakSevben/2024_Product_Inventory_with_Export_to_Excel_XSS",
288-
"https://github.com/BurakSevben/Daily_Habit_Tracker_App_SQL_Injection",
289-
"https://github.com/BurakSevben/Login_System_with_Email_Verification_SQL_Injection",
290-
"https://github.com/BurakSevben/School-Task-Manager-System-SQLi-1",
291-
"https://github.com/ByteHackr/unzip_poc",
292-
"https://github.com/capgeminicisredteam/disclosure",
293-
"https://github.com/CapgeminiCisRedTeam/Disclosure",
294-
"https://github.com/ch0ing/vul",
295-
"https://github.com/Ch0pin/security-advisories",
296-
"https://github.com/chenan224/webchess_sqli_poc",
297-
"https://github.com/Chu1z1/Chuizi",
298-
"https://github.com/ciph0x01/poc",
299-
"https://github.com/ciph0x01/Simple-Exam-Reviewer-Management-System-CVE",
300-
"https://github.com/cloudflare/advisories",
301-
"https://github.com/Coalfire-Research/WinAPRS-Exploits",
302230
"https://github.com/ComparedArray/printix-CVE-2022-25089",
303-
"https://github.com/cribdragg3r/offensive_research",
304-
"https://github.com/ctflearner/Vulnerability",
305-
"https://github.com/cvdyfbwa/IoT_LBT_Router",
306-
"https://github.com/CVEProject/cvelist", // Heavily in Advisory URLs, sometimes shows up elsewhere
307-
"https://github.com/Cvjark/Poc",
308-
"https://github.com/cxaqhq/Loan-Management-System-Sqlinjection",
309-
"https://github.com/cxcxcxcxcxcxcxc/cxcxcxcxcxcxcxc",
310-
"https://github.com/cybersecurityworks/disclosed",
311-
"https://github.com/D4rkP0w4r/AeroCMS-Add_Posts-Stored_XSS-Poc",
312-
"https://github.com/D4rkP0w4r/AeroCMS-Comment-Stored_XSS-Poc",
313-
"https://github.com/D4rkP0w4r/AeroCMS-Unrestricted-File-Upload-POC",
314-
"https://github.com/D4rkP0w4r/Full-Ecommece-Website-Add_Product-Unrestricted-File-Upload-RCE-POC",
315-
"https://github.com/D4rkP0w4r/Full-Ecommece-Website-Add_User-Stored-XSS-POC",
316-
"https://github.com/D4rkP0w4r/Full-Ecommece-Website-Slides-Unrestricted-File-Upload-RCE-POC",
317-
"https://github.com/D4rkP0w4r/sms-Add_Student-Stored_XSS-POC",
318-
"https://github.com/D4rkP0w4r/sms-Unrestricted-File-Upload-RCE-POC",
319-
"https://github.com/dhabaleshwar/Open-Source-Vulnerabilities",
320-
"https://github.com/dhammon/pfBlockerNg-CVE-2022-40624",
321-
"https://github.com/dhammon/pfBlockerNg-RCE",
322-
"https://github.com/Dheeraj-Deshmukh/Hospital-s-patient-management-system",
323-
"https://github.com/Dheeraj-Deshmukh/stored-xss-in-Hospital-s-Patient-Records-Management-System",
324-
"https://github.com/digitemis/advisory",
325-
"https://github.com/DiliLearngent/BugReport",
326-
"https://github.com/Dir0x/Multiple-SQLi-in-Simple-Subscription-Company",
327-
"https://github.com/Dir0x/SQLi-exploit---Simple-Client-Management-System",
328-
"https://github.com/DisguisedRoot/Exploit",
329-
"https://github.com/Don-H50/wp-vul",
330-
"https://github.com/dota-st/Vulnerability",
331-
"https://github.com/draco1725/POC",
332-
"https://github.com/draco1725/Stored-XSS",
333-
"https://github.com/Durian1546/vul",
334-
"https://github.com/Dyrandy/BugBounty",
335-
"https://github.com/E1CHO/water_cve",
336-
"https://github.com/Edubr2020/RealPlayer_G2_RCE",
337-
"https://github.com/Edubr2020/RP_DCP_Code_Exec",
338-
"https://github.com/Edubr2020/RP_Import_RCE",
339-
"https://github.com/enesozeser/Vulnerabilities",
340-
"https://github.com/Ephemeral1y/Vulnerability",
341-
"https://github.com/erengozaydin/College-Management-System-course_code-SQL-Injection-Authenticated",
342-
"https://github.com/erengozaydin/Microfinance-Management-System-V1.0-SQL-Injection-Vulnerability-Unauthenticated",
343-
"https://github.com/erengozaydin/Royal-Event-Management-System-todate-SQL-Injection-Authenticated",
344-
"https://github.com/esp0xdeadbeef/rce_webmin",
345-
"https://github.com/etn0tw/cmscve_test",
346-
"https://github.com/f4cky0u/security-vulnerabilities",
347-
"https://github.com/FCncdn/Appsmith-Js-Injection-POC",
348-
"https://github.com/Filiplain/LFI-to-RCE-SE-Suite-2.0",
349-
"https://github.com/fireeye/Vulnerability-Disclosures",
350-
"https://github.com/frame84/vulns",
351-
"https://github.com/Frank-Z7/z-vulnerabilitys",
352-
"https://github.com/friends-of-presta/security-advisories",
353-
"https://github.com/funny-mud-peee/IoT-vuls",
354-
"https://github.com/FusionAuth/fusionauth-issues",
355-
"https://github.com/g1an123/poc",
356-
"https://github.com/gdianq/Gym-Management-Exercises-Sqlinjection",
357-
"https://github.com/gdianq/Gym-Management-System-loginpage-Sqlinjection",
358-
"https://github.com/gdianq/Gym-Management-System-Sqlinjection",
359-
"https://github.com/gdianq/Sparkz-Hotel-Management-loginpage-Sqlinjection",
360-
"https://github.com/github/cvelist", // Fork of https://github.com/CVEProject/cvelist
231+
"https://github.com/CVEProject/cvelist",
232+
"https://github.com/github/cvelist", // Heavily in Advisory URLs, sometimes shows up elsewhere
361233
"https://github.com/github/securitylab",
362-
"https://github.com/gitlabhq/gitlabhq", // GitHub mirror, not canonical
363-
"https://github.com/google/oss-fuzz-vulns", // 8^)
364-
"https://github.com/gou-web/Parking-management-systemXSS-",
365-
"https://github.com/Gr4y21/My-CVE-IDs",
366-
"https://github.com/grafana/bugbounty",
367-
"https://github.com/guyinatuxedo/sqlite3_record_leaking",
368-
"https://github.com/H4rk3nz0/PenTesting",
369-
"https://github.com/hackerzyq/mycve",
370-
"https://github.com/haile01/perl_spreadsheet_excel_rce_poc",
371-
"https://github.com/Hakcoder/Simple-Online-Public-Access-Catalog-OPAC---SQL-injection",
372-
"https://github.com/Hanfu-l/POC-Exp",
373-
"https://github.com/hashicorp/terraform-enterprise-release-notes",
374-
"https://github.com/haxpunk1337/Enterprise-Survey-Software",
375-
"https://github.com/haxpunk1337/MDaemon-",
376-
"https://github.com/Hckwzh/cms",
377-
"https://github.com/HH1F/KbaseDoc-v1.0-Arbitrary-file-deletion-vulnerability",
378-
"https://github.com/hkerma/opa-gatekeeper-concurrency-issue",
379-
"https://github.com/hmsec/advisories",
380-
"https://github.com/hnsecurity/vulns",
381-
"https://github.com/hubenlab/hubenvullist",
382-
"https://github.com/Hyperkopite/Roothub_vulns",
383-
"https://github.com/i3umi3iei3ii/CentOS-Control-Web-Panel-CVE",
384-
"https://github.com/ianxtianxt/gitbook-xss",
385-
"https://github.com/imsebao/404team",
386-
"https://github.com/InfoSecWarrior/Offensive-Payloads",
387-
"https://github.com/IthacaLabs/DevExpress",
388-
"https://github.com/IthacaLabs/Parallels",
389-
"https://github.com/IthacaLabs/Vsourz-Digital",
390-
"https://github.com/itodaro/doorGets_cve",
391-
"https://github.com/Jaarden/AlphaInnotec-Password-Vulnerability",
392-
"https://github.com/jacky-y/vuls",
393-
"https://github.com/JackyG0/Online-Accreditation-Management-System-v1.0-SQLi",
394-
"https://github.com/Jamison2022/Company-Website-CMS",
395-
"https://github.com/Jamison2022/Wedding-Hall-Booking-System",
396-
"https://github.com/jcarabantes/Bus-Vulnerabilities",
397-
"https://github.com/jingping911/exshopbug",
398-
"https://github.com/jiy2020/bugReport",
399-
"https://github.com/jlleitschuh/security-research",
400-
"https://github.com/jmrcsnchz/ClinicQueueingSystem_RCE",
401-
"https://github.com/joinia/webray.com.cn",
402-
"https://github.com/jomskiller/Employee-Management-System---Stored-XSS",
403-
"https://github.com/jomskiller/Employee-Managemet-System---Broken-Access-Control",
404-
"https://github.com/JunyanYip/itsourcecode_justines_xss_vul",
405-
"https://github.com/jusstSahil/CSRF-",
406-
"https://github.com/jvz/test-cvelist",
407-
"https://github.com/k0xx11/vul-wiki",
408-
"https://github.com/k0xx11/Vulscve",
409-
"https://github.com/kaoudis/advisories",
410-
"https://github.com/keru6k/Online-Admission-System-RCE-PoC",
411-
"https://github.com/Keyvanhardani/Exploit-eShop-Multipurpose-Ecommerce-Store-Website-3.0.4-Cross-Site-Scripting-XSS",
412-
"https://github.com/killmonday/isic.lk-RCE",
413-
"https://github.com/KingBridgeSS/Online_Driving_School_Project_In_PHP_With_Source_Code_Vulnerabilities",
414-
"https://github.com/Kitsun3Sec/exploits",
415-
"https://github.com/kk98kk0/exploit",
416-
"https://github.com/KLSEHB/vulnerability-report",
417-
"https://github.com/kmkz/exploit",
418-
"https://github.com/kyrie403/Vuln",
419-
"https://github.com/L1917/Fast-Food-Ordering-System",
420-
"https://github.com/l1nk3rlin/php_code_audit_project",
421-
"https://github.com/lakshaya0557/POCs",
422-
"https://github.com/laoquanshi/BILLING-SOFTWARE-SQL-injection-vulnerability",
423-
"https://github.com/laoquanshi/PHPGurukul-Hospital-Management-System",
424-
"https://github.com/laotun-s/POC",
425-
"https://github.com/Lemon4044/Fast-Food-Ordering-System",
426-
"https://github.com/lohyt/Persistent-Cross-Site-Scripting-found-in-Online-Jewellery-Store-from-Sourcecodester-website.",
427-
"https://github.com/lohyt/web-shell-via-file-upload-in-hocms",
428-
"https://github.com/luelueking/ruoyi-4.7.5-vuln-poc",
429-
"https://github.com/lukaszstu/SmartAsset-CORS-CVE-2020-26527",
430-
"https://github.com/ly1g3/Mailcow-CVE-2022-31138",
431-
"https://github.com/mandiant/Vulnerability-Disclosures",
432-
"https://github.com/Matrix07ksa/ALLMediaServer-1.6-Buffer-Overflow",
433-
"https://github.com/mclab-hbrs/BBB-POC",
434-
"https://github.com/metaredteam/external-disclosures",
435-
"https://github.com/metaStor/Vuls",
436-
"https://github.com/mi2acle/forucmsvuln",
437-
"https://github.com/mikeccltt/0525",
438-
"https://github.com/mikeccltt/0724",
439-
"https://github.com/mikeccltt/automotive",
440-
"https://github.com/mikeccltt/badminton-center-management-system",
441-
"https://github.com/mikeccltt/chatbot",
442-
"https://github.com/mikeccltt/wbms_bug_report",
443-
"https://github.com/mikeisastar/counter-strike-arbitrary-file-read",
444-
"https://github.com/Mirantis/security",
445-
"https://github.com/mirchr/security-research",
446-
"https://github.com/Mr-Secure-Code/My-CVE",
447-
"https://github.com/mrojz/rconfig-exploit",
448-
"https://github.com/MrTuxracer/advisories",
234+
"https://github.com/gitlabhq/gitlabhq", // GitHub mirror, not canonical
449235
"https://github.com/n0Sleeper/bosscmsVuln",
450-
"https://github.com/N1ce759/74cmsSE-Arbitrary-File-Reading",
451-
"https://github.com/nam3lum/msi-central_privesc",
452-
"https://github.com/Netflix/security-bulletins",
453-
"https://github.com/nextcloud/security-advisories",
454-
"https://github.com/novysodope/vulreq",
455-
"https://github.com/nsparker1337/OpenSource",
456-
"https://github.com/offsecin/bugsdisclose",
457-
"https://github.com/orangecertcc/security-research",
458-
"https://github.com/Ozozuz/Qlik-View-Stored-XSS",
459-
"https://github.com/PabloMK7/ENLBufferPwn",
460-
"https://github.com/palantir/security-bulletins",
461-
"https://github.com/passtheticket/vulnerability-research",
462-
"https://github.com/Peanut886/Vulnerability",
463-
"https://github.com/piuppi/proof-of-concepts",
464-
"https://github.com/playZG/Exploit-",
465-
"https://github.com/PostalBlab/Vulnerabilities",
466-
"https://github.com/prismbreak/vulnerabilities",
467-
"https://github.com/purplededa/EasyoneCRM-5.50.02-SQLinjection",
468-
"https://github.com/PurplePetrus/MxCC_Credential-Storage_issue",
469-
"https://github.com/qqqyc/vlun1",
470-
"https://github.com/Ramansh123454/POCs",
471-
"https://github.com/rand0midas/randomideas",
472236
"https://github.com/rapid7/metasploit-framework",
473-
"https://github.com/riteshgohil/My_CVE_References",
474-
"https://github.com/rohit0x5/poc",
475-
"https://github.com/rsrahulsingh05/POC",
476-
"https://github.com/rtcrowley/poc",
477-
"https://github.com/rumble773/sec-research",
478-
"https://github.com/Ryan0lb/EC-cloud-e-commerce-system-CVE-application",
479-
"https://github.com/s1kr10s/EasyChatServer-DOS",
480-
"https://github.com/saitamang/POC-DUMP",
481-
"https://github.com/sartlabs/0days",
482-
"https://github.com/SaumyajeetDas/POC-of-CVE-2022-36271",
483-
"https://github.com/SaumyajeetDas/Vulnerability",
484-
"https://github.com/secf0ra11/secf0ra11.github.io",
485-
"https://github.com/Security-AVS/-CVE-2021-26904",
486-
"https://github.com/seizer-zyx/Vulnerability",
487-
"https://github.com/seqred-s-a/gxdlmsdirector-cve",
488-
"https://github.com/Serces-X/vul_report",
489-
"https://github.com/shellshok3/Cross-Site-Scripting-XSS",
490-
"https://github.com/sickcodes/security",
491-
"https://github.com/silence-silence/xxl-job-lateral-privilege-escalation-vulnerability-",
492-
"https://github.com/sinemsahn/POC",
493-
"https://github.com/sleepyvv/vul_report",
494-
"https://github.com/smurf-reigz/security",
495-
"https://github.com/Snakinya/Vuln",
496-
"https://github.com/snyk/zip-slip-vulnerability",
497-
"https://github.com/soheilsamanabadi/vulnerability",
498-
"https://github.com/soheilsamanabadi/vulnerabilitys",
499-
"https://github.com/Sospiro014/zday1",
500-
"https://github.com/soundarkutty/stored-xss",
501-
"https://github.com/souravkr529/CSRF-in-Cold-Storage-Management-System",
502-
"https://github.com/spwpun/ntp-4.2.8p15-cves",
503-
"https://github.com/sromanhu/Cmsmadesimple-CMS-Stored-XSS",
504-
"https://github.com/sromanhu/CMSmadesimple-File-Upload--XSS---File-Manager",
505-
"https://github.com/sromanhu/CSZ-CMS-Stored-XSS---Pages-Content",
506-
"https://github.com/sromanhu/e107-CMS-Stored-XSS---Manage",
507-
"https://github.com/sromanhu/RiteCMS-Stored-XSS---Home",
508237
"https://github.com/starnightcyber/miscellaneous",
509-
"https://github.com/strangebeecorp/security",
510-
"https://github.com/strik3r0x1/Vulns",
511-
"https://github.com/sunset-move/EasyImages2.0-arbitrary-file-download-vulnerability",
512-
"https://github.com/SunshineOtaku/Report-CVE",
513-
"https://github.com/superkojiman/vulnerabilities",
514-
"https://github.com/sweatxi/BugHub",
515-
"https://github.com/TCSWT/Baby-Care-System",
516-
"https://github.com/thehackingverse/Stored-xss-",
517-
"https://github.com/theyiyibest/Reflected-XSS-on-SockJS",
518-
"https://github.com/thisissuperann/Vul",
519-
"https://github.com/TimeSeg/IOT_CVE",
520-
"https://github.com/TishaManandhar/Superstore-sql-poc",
521-
"https://github.com/toyydsBT123/One_of_my_take_on_SourceCodester",
522-
"https://github.com/transcendent-group/advisories",
523-
"https://github.com/tremwil/ds3-nrssr-rce",
524-
"https://github.com/trinity-syt-security/xss_vuln_issue",
525-
"https://github.com/Trinity-SYT-SECURITY/XSS_vuln_issue",
526-
"https://github.com/uBlockOrigin/uBlock-issues",
527-
"https://github.com/umarfarook882/avast_multiple_vulnerability_disclosure",
528-
"https://github.com/v2ish1yan/mycve",
529-
"https://github.com/V3geD4g/cmseasy_vul",
530-
"https://github.com/verf1sh/Poc",
531-
"https://github.com/versprite/research",
532-
"https://github.com/VistaAX/vulnerablility",
533-
"https://github.com/vQAQv/Request-CVE-ID-PoC",
534-
"https://github.com/vulnerabilities-cve/vulnerabilities",
535-
"https://github.com/vuls/vuls",
536-
"https://github.com/wagnerdracha/ProofOfConcept",
537-
"https://github.com/wandera/public-disclosures",
538-
"https://github.com/Wh04m1001/ZoneAlarmEoP",
539-
"https://github.com/whiex/c2Rhc2Rhc2Q-",
540-
"https://github.com/whitehatl/Vulnerability",
541-
"https://github.com/wind-cyber/LJCMS-UserTraversal-Vulnerability",
542-
"https://github.com/wkeyi0x1/vul-report",
543-
"https://github.com/wsummerhill/BSA-Radar_CVE-Vulnerabilities",
544-
"https://github.com/xcodeOn1/xcode0x-CVEs",
545-
"https://github.com/XiLitter/CMS_vulnerability-discovery",
546-
"https://github.com/xnobody12/jaws-cms-rce",
547-
"https://github.com/Xor-Gerke/webray.com.cn",
548-
"https://github.com/xuanluansec/vul",
549-
"https://github.com/xunyang1/my-vulnerability",
550-
"https://github.com/xxhzz1/74cmsSE-Arbitrary-file-upload-vulnerability",
551-
"https://github.com/y1s3m0/vulnfind",
552-
"https://github.com/yasinyildiz26/Badminton-Center-Management-System",
553-
"https://github.com/YavuzSahbaz/Limbas-4.3.36.1319-is-vulnerable-to-Cross-Site-Scripting-XSS-",
554-
"https://github.com/YavuzSahbaz/Red-Planet-Laundry-Management-System-1.0-is-vulnerable-to-SQL",
555-
"https://github.com/ycdxsb/Vuln",
556-
"https://github.com/ykosan1/Simple-Task-Scheduling-System-id-SQL-Injection-Unauthenticated",
557-
"https://github.com/YLoiK/74cmsSE-Arbitrary-file-upload-vulnerability",
558-
"https://github.com/Yu1e/vuls",
559-
"https://github.com/YZLCQX/Mailbox-remote-command-execution",
560-
"https://github.com/z00z00z00/Safenet_SAC_CVE-2021-42056",
561-
"https://github.com/zerrr0/Zerrr0_Vulnerability",
562-
"https://github.com/Zeyad-Azima/Issabel-stored-XSS",
563-
"https://github.com/ZhuoNiBa/Delta-DIAEnergie-XSS",
564-
"https://github.com/ZJQcicadawings/VulSql",
565-
"https://github.com/Zoe0427/YJCMS",
566-
"https://github.com/zzh-newlearner/record",
567-
"https://gitlab.com/-/snippets/1937042",
568-
"https://gitlab.com/FallFur/exploiting-unprotected-admin-funcionalities-on-besder-ip-cameras",
569238
"https://gitlab.com/gitlab-org/gitlab-ce", // redirects to gitlab-foss
570239
"https://gitlab.com/gitlab-org/gitlab-ee", // redirects to gitlab
571240
"https://gitlab.com/gitlab-org/gitlab-foss", // not the canonical source
572241
"https://gitlab.com/gitlab-org/omnibus-gitlab", // not the source
573-
"https://gitlab.com/gitlab-org/release", // not the source
574-
"https://gitlab.com/kop316/vvm-disclosure",
575-
"https://gitlab.com/yongchuank/avast-aswsnx-ioctl-82ac0060-oob-write",
576242
}
577243
InvalidRepoRegex = `(?i)/(?:(?:CVEs?)|(?:CVE-\d{4}-\d{4,})(?:/?.*)?|bug_report(?:/.*)?|GitHubAssessments/.*)`
578244
)

0 commit comments

Comments
 (0)