@@ -226,353 +226,19 @@ type CPE struct {
226226}
227227
228228var (
229- // TODO(apollock): read this from an external file
230229 InvalidRepos = []string {
231- "https://github.com/0day1/g1ory" ,
232- "https://github.com/0x14dli/ffos-SQL-injection-vulnerability-exists" ,
233- "https://github.com/0xdea/exploits" ,
234- "https://github.com/0xQRx/VulnerabilityResearch" ,
235- "https://github.com/0xxtoby/Vuldb" ,
236- "https://github.com/10cks/inkdropPoc" ,
237- "https://github.com/10cksyiqiyinhangzhoutechnology/elf-parser_segments_poc" ,
238- "https://github.com/1MurasaKi/Eyewear_Shop_XSS" ,
239- "https://github.com/1MurasaKi/PboostCMS_XSS" ,
240- "https://github.com/1MurasaKi/PizzeXSS_Report" ,
241- "https://github.com/1MurasaKi/STMS_CSRF" ,
242- "https://github.com/1s1and123/Vulnerabilities" ,
243- "https://github.com/1security/Vulnerability" ,
244- "https://github.com/202ecommerce/security-advisories" ,
245- "https://github.com/594238758/mycve" ,
246- "https://github.com/777erp/cms" ,
247- "https://github.com/A-TGAO/MxsDocVul" ,
248- "https://github.com/abcdefg-png/IoT-vulnerable" ,
249- "https://github.com/abhiunix/goo-blog-App-CVE" ,
250- "https://github.com/Accenture/AARO-Bugs" ,
251- "https://github.com/active-labs/Advisories" ,
252- "https://github.com/ae6e361b/online-job-portal-forget" ,
253- "https://github.com/agadient/SERVEEZ-CVE" ,
254- "https://github.com/Airrudder/vuls" ,
255- "https://github.com/AlwaysHereFight/YZMCMSxss" ,
256- "https://github.com/alwentiu/COVIDSafe-CVE-2020-12856" ,
257- "https://github.com/anhdq201/rukovoditel" ,
258- "https://github.com/anhdq201/webtareas" ,
259- "https://github.com/anvilsecure/garmin-ciq-app-research" ,
260- "https://github.com/Anza2001/IOT_VULN" ,
261- "https://github.com/apriorit/pentesting" ,
262- "https://github.com/ArianeBlow/Axelor_Stored_XSS" ,
263- "https://github.com/atredispartners/advisories" ,
264- "https://github.com/awillix/research" ,
265- "https://github.com/b17fr13nds/MPlayer_cve_poc" ,
266- "https://github.com/badboycxcc/Student-Admission-Sqlinjection" ,
267- "https://github.com/badboycxcc/Student-Admission-Xss" ,
268- "https://github.com/beicheng-maker/vulns" ,
269- "https://github.com/benjaminpsinclair/netdisco-2023-advisory" ,
270- "https://github.com/biantaibao/mldong_RCE" ,
271- "https://github.com/biantaibao/octopus_SQL" ,
272- "https://github.com/biantaibao/octopus_XSS" ,
273- "https://github.com/biantaibao/zhglxt_xss" ,
274- "https://github.com/BigTiger2020/2022" ,
275- "https://github.com/BigTiger2020/2023-1" ,
276- "https://github.com/BigTiger2020/2023" ,
277- "https://github.com/BigTiger2020/74CMS" ,
278- "https://github.com/BigTiger2020/Fantastic-Blog-CMS-" ,
279- "https://github.com/BigTiger2020/Theme-Park-Ticketing-System" ,
280- "https://github.com/BigTiger2020/UCMS" ,
281- "https://github.com/BlackFan/client-side-prototype-pollution" ,
282- "https://github.com/BLL-l/vulnerability_wiki" ,
283- "https://github.com/blockomat2100/PoCs" ,
284- "https://github.com/bosslabdcu/Vulnerability-Reporting" ,
285- "https://github.com/BurakSevben/2024_Math_Game_XSS" ,
286- "https://github.com/BurakSevben/2024_Online_Food_Menu_XSS" ,
287- "https://github.com/BurakSevben/2024_Product_Inventory_with_Export_to_Excel_XSS" ,
288- "https://github.com/BurakSevben/Daily_Habit_Tracker_App_SQL_Injection" ,
289- "https://github.com/BurakSevben/Login_System_with_Email_Verification_SQL_Injection" ,
290- "https://github.com/BurakSevben/School-Task-Manager-System-SQLi-1" ,
291- "https://github.com/ByteHackr/unzip_poc" ,
292- "https://github.com/capgeminicisredteam/disclosure" ,
293- "https://github.com/CapgeminiCisRedTeam/Disclosure" ,
294- "https://github.com/ch0ing/vul" ,
295- "https://github.com/Ch0pin/security-advisories" ,
296- "https://github.com/chenan224/webchess_sqli_poc" ,
297- "https://github.com/Chu1z1/Chuizi" ,
298- "https://github.com/ciph0x01/poc" ,
299- "https://github.com/ciph0x01/Simple-Exam-Reviewer-Management-System-CVE" ,
300- "https://github.com/cloudflare/advisories" ,
301- "https://github.com/Coalfire-Research/WinAPRS-Exploits" ,
302230 "https://github.com/ComparedArray/printix-CVE-2022-25089" ,
303- "https://github.com/cribdragg3r/offensive_research" ,
304- "https://github.com/ctflearner/Vulnerability" ,
305- "https://github.com/cvdyfbwa/IoT_LBT_Router" ,
306- "https://github.com/CVEProject/cvelist" , // Heavily in Advisory URLs, sometimes shows up elsewhere
307- "https://github.com/Cvjark/Poc" ,
308- "https://github.com/cxaqhq/Loan-Management-System-Sqlinjection" ,
309- "https://github.com/cxcxcxcxcxcxcxc/cxcxcxcxcxcxcxc" ,
310- "https://github.com/cybersecurityworks/disclosed" ,
311- "https://github.com/D4rkP0w4r/AeroCMS-Add_Posts-Stored_XSS-Poc" ,
312- "https://github.com/D4rkP0w4r/AeroCMS-Comment-Stored_XSS-Poc" ,
313- "https://github.com/D4rkP0w4r/AeroCMS-Unrestricted-File-Upload-POC" ,
314- "https://github.com/D4rkP0w4r/Full-Ecommece-Website-Add_Product-Unrestricted-File-Upload-RCE-POC" ,
315- "https://github.com/D4rkP0w4r/Full-Ecommece-Website-Add_User-Stored-XSS-POC" ,
316- "https://github.com/D4rkP0w4r/Full-Ecommece-Website-Slides-Unrestricted-File-Upload-RCE-POC" ,
317- "https://github.com/D4rkP0w4r/sms-Add_Student-Stored_XSS-POC" ,
318- "https://github.com/D4rkP0w4r/sms-Unrestricted-File-Upload-RCE-POC" ,
319- "https://github.com/dhabaleshwar/Open-Source-Vulnerabilities" ,
320- "https://github.com/dhammon/pfBlockerNg-CVE-2022-40624" ,
321- "https://github.com/dhammon/pfBlockerNg-RCE" ,
322- "https://github.com/Dheeraj-Deshmukh/Hospital-s-patient-management-system" ,
323- "https://github.com/Dheeraj-Deshmukh/stored-xss-in-Hospital-s-Patient-Records-Management-System" ,
324- "https://github.com/digitemis/advisory" ,
325- "https://github.com/DiliLearngent/BugReport" ,
326- "https://github.com/Dir0x/Multiple-SQLi-in-Simple-Subscription-Company" ,
327- "https://github.com/Dir0x/SQLi-exploit---Simple-Client-Management-System" ,
328- "https://github.com/DisguisedRoot/Exploit" ,
329- "https://github.com/Don-H50/wp-vul" ,
330- "https://github.com/dota-st/Vulnerability" ,
331- "https://github.com/draco1725/POC" ,
332- "https://github.com/draco1725/Stored-XSS" ,
333- "https://github.com/Durian1546/vul" ,
334- "https://github.com/Dyrandy/BugBounty" ,
335- "https://github.com/E1CHO/water_cve" ,
336- "https://github.com/Edubr2020/RealPlayer_G2_RCE" ,
337- "https://github.com/Edubr2020/RP_DCP_Code_Exec" ,
338- "https://github.com/Edubr2020/RP_Import_RCE" ,
339- "https://github.com/enesozeser/Vulnerabilities" ,
340- "https://github.com/Ephemeral1y/Vulnerability" ,
341- "https://github.com/erengozaydin/College-Management-System-course_code-SQL-Injection-Authenticated" ,
342- "https://github.com/erengozaydin/Microfinance-Management-System-V1.0-SQL-Injection-Vulnerability-Unauthenticated" ,
343- "https://github.com/erengozaydin/Royal-Event-Management-System-todate-SQL-Injection-Authenticated" ,
344- "https://github.com/esp0xdeadbeef/rce_webmin" ,
345- "https://github.com/etn0tw/cmscve_test" ,
346- "https://github.com/f4cky0u/security-vulnerabilities" ,
347- "https://github.com/FCncdn/Appsmith-Js-Injection-POC" ,
348- "https://github.com/Filiplain/LFI-to-RCE-SE-Suite-2.0" ,
349- "https://github.com/fireeye/Vulnerability-Disclosures" ,
350- "https://github.com/frame84/vulns" ,
351- "https://github.com/Frank-Z7/z-vulnerabilitys" ,
352- "https://github.com/friends-of-presta/security-advisories" ,
353- "https://github.com/funny-mud-peee/IoT-vuls" ,
354- "https://github.com/FusionAuth/fusionauth-issues" ,
355- "https://github.com/g1an123/poc" ,
356- "https://github.com/gdianq/Gym-Management-Exercises-Sqlinjection" ,
357- "https://github.com/gdianq/Gym-Management-System-loginpage-Sqlinjection" ,
358- "https://github.com/gdianq/Gym-Management-System-Sqlinjection" ,
359- "https://github.com/gdianq/Sparkz-Hotel-Management-loginpage-Sqlinjection" ,
360- "https://github.com/github/cvelist" , // Fork of https://github.com/CVEProject/cvelist
231+ "https://github.com/CVEProject/cvelist" ,
232+ "https://github.com/github/cvelist" , // Heavily in Advisory URLs, sometimes shows up elsewhere
361233 "https://github.com/github/securitylab" ,
362- "https://github.com/gitlabhq/gitlabhq" , // GitHub mirror, not canonical
363- "https://github.com/google/oss-fuzz-vulns" , // 8^)
364- "https://github.com/gou-web/Parking-management-systemXSS-" ,
365- "https://github.com/Gr4y21/My-CVE-IDs" ,
366- "https://github.com/grafana/bugbounty" ,
367- "https://github.com/guyinatuxedo/sqlite3_record_leaking" ,
368- "https://github.com/H4rk3nz0/PenTesting" ,
369- "https://github.com/hackerzyq/mycve" ,
370- "https://github.com/haile01/perl_spreadsheet_excel_rce_poc" ,
371- "https://github.com/Hakcoder/Simple-Online-Public-Access-Catalog-OPAC---SQL-injection" ,
372- "https://github.com/Hanfu-l/POC-Exp" ,
373- "https://github.com/hashicorp/terraform-enterprise-release-notes" ,
374- "https://github.com/haxpunk1337/Enterprise-Survey-Software" ,
375- "https://github.com/haxpunk1337/MDaemon-" ,
376- "https://github.com/Hckwzh/cms" ,
377- "https://github.com/HH1F/KbaseDoc-v1.0-Arbitrary-file-deletion-vulnerability" ,
378- "https://github.com/hkerma/opa-gatekeeper-concurrency-issue" ,
379- "https://github.com/hmsec/advisories" ,
380- "https://github.com/hnsecurity/vulns" ,
381- "https://github.com/hubenlab/hubenvullist" ,
382- "https://github.com/Hyperkopite/Roothub_vulns" ,
383- "https://github.com/i3umi3iei3ii/CentOS-Control-Web-Panel-CVE" ,
384- "https://github.com/ianxtianxt/gitbook-xss" ,
385- "https://github.com/imsebao/404team" ,
386- "https://github.com/InfoSecWarrior/Offensive-Payloads" ,
387- "https://github.com/IthacaLabs/DevExpress" ,
388- "https://github.com/IthacaLabs/Parallels" ,
389- "https://github.com/IthacaLabs/Vsourz-Digital" ,
390- "https://github.com/itodaro/doorGets_cve" ,
391- "https://github.com/Jaarden/AlphaInnotec-Password-Vulnerability" ,
392- "https://github.com/jacky-y/vuls" ,
393- "https://github.com/JackyG0/Online-Accreditation-Management-System-v1.0-SQLi" ,
394- "https://github.com/Jamison2022/Company-Website-CMS" ,
395- "https://github.com/Jamison2022/Wedding-Hall-Booking-System" ,
396- "https://github.com/jcarabantes/Bus-Vulnerabilities" ,
397- "https://github.com/jingping911/exshopbug" ,
398- "https://github.com/jiy2020/bugReport" ,
399- "https://github.com/jlleitschuh/security-research" ,
400- "https://github.com/jmrcsnchz/ClinicQueueingSystem_RCE" ,
401- "https://github.com/joinia/webray.com.cn" ,
402- "https://github.com/jomskiller/Employee-Management-System---Stored-XSS" ,
403- "https://github.com/jomskiller/Employee-Managemet-System---Broken-Access-Control" ,
404- "https://github.com/JunyanYip/itsourcecode_justines_xss_vul" ,
405- "https://github.com/jusstSahil/CSRF-" ,
406- "https://github.com/jvz/test-cvelist" ,
407- "https://github.com/k0xx11/vul-wiki" ,
408- "https://github.com/k0xx11/Vulscve" ,
409- "https://github.com/kaoudis/advisories" ,
410- "https://github.com/keru6k/Online-Admission-System-RCE-PoC" ,
411- "https://github.com/Keyvanhardani/Exploit-eShop-Multipurpose-Ecommerce-Store-Website-3.0.4-Cross-Site-Scripting-XSS" ,
412- "https://github.com/killmonday/isic.lk-RCE" ,
413- "https://github.com/KingBridgeSS/Online_Driving_School_Project_In_PHP_With_Source_Code_Vulnerabilities" ,
414- "https://github.com/Kitsun3Sec/exploits" ,
415- "https://github.com/kk98kk0/exploit" ,
416- "https://github.com/KLSEHB/vulnerability-report" ,
417- "https://github.com/kmkz/exploit" ,
418- "https://github.com/kyrie403/Vuln" ,
419- "https://github.com/L1917/Fast-Food-Ordering-System" ,
420- "https://github.com/l1nk3rlin/php_code_audit_project" ,
421- "https://github.com/lakshaya0557/POCs" ,
422- "https://github.com/laoquanshi/BILLING-SOFTWARE-SQL-injection-vulnerability" ,
423- "https://github.com/laoquanshi/PHPGurukul-Hospital-Management-System" ,
424- "https://github.com/laotun-s/POC" ,
425- "https://github.com/Lemon4044/Fast-Food-Ordering-System" ,
426- "https://github.com/lohyt/Persistent-Cross-Site-Scripting-found-in-Online-Jewellery-Store-from-Sourcecodester-website." ,
427- "https://github.com/lohyt/web-shell-via-file-upload-in-hocms" ,
428- "https://github.com/luelueking/ruoyi-4.7.5-vuln-poc" ,
429- "https://github.com/lukaszstu/SmartAsset-CORS-CVE-2020-26527" ,
430- "https://github.com/ly1g3/Mailcow-CVE-2022-31138" ,
431- "https://github.com/mandiant/Vulnerability-Disclosures" ,
432- "https://github.com/Matrix07ksa/ALLMediaServer-1.6-Buffer-Overflow" ,
433- "https://github.com/mclab-hbrs/BBB-POC" ,
434- "https://github.com/metaredteam/external-disclosures" ,
435- "https://github.com/metaStor/Vuls" ,
436- "https://github.com/mi2acle/forucmsvuln" ,
437- "https://github.com/mikeccltt/0525" ,
438- "https://github.com/mikeccltt/0724" ,
439- "https://github.com/mikeccltt/automotive" ,
440- "https://github.com/mikeccltt/badminton-center-management-system" ,
441- "https://github.com/mikeccltt/chatbot" ,
442- "https://github.com/mikeccltt/wbms_bug_report" ,
443- "https://github.com/mikeisastar/counter-strike-arbitrary-file-read" ,
444- "https://github.com/Mirantis/security" ,
445- "https://github.com/mirchr/security-research" ,
446- "https://github.com/Mr-Secure-Code/My-CVE" ,
447- "https://github.com/mrojz/rconfig-exploit" ,
448- "https://github.com/MrTuxracer/advisories" ,
234+ "https://github.com/gitlabhq/gitlabhq" , // GitHub mirror, not canonical
449235 "https://github.com/n0Sleeper/bosscmsVuln" ,
450- "https://github.com/N1ce759/74cmsSE-Arbitrary-File-Reading" ,
451- "https://github.com/nam3lum/msi-central_privesc" ,
452- "https://github.com/Netflix/security-bulletins" ,
453- "https://github.com/nextcloud/security-advisories" ,
454- "https://github.com/novysodope/vulreq" ,
455- "https://github.com/nsparker1337/OpenSource" ,
456- "https://github.com/offsecin/bugsdisclose" ,
457- "https://github.com/orangecertcc/security-research" ,
458- "https://github.com/Ozozuz/Qlik-View-Stored-XSS" ,
459- "https://github.com/PabloMK7/ENLBufferPwn" ,
460- "https://github.com/palantir/security-bulletins" ,
461- "https://github.com/passtheticket/vulnerability-research" ,
462- "https://github.com/Peanut886/Vulnerability" ,
463- "https://github.com/piuppi/proof-of-concepts" ,
464- "https://github.com/playZG/Exploit-" ,
465- "https://github.com/PostalBlab/Vulnerabilities" ,
466- "https://github.com/prismbreak/vulnerabilities" ,
467- "https://github.com/purplededa/EasyoneCRM-5.50.02-SQLinjection" ,
468- "https://github.com/PurplePetrus/MxCC_Credential-Storage_issue" ,
469- "https://github.com/qqqyc/vlun1" ,
470- "https://github.com/Ramansh123454/POCs" ,
471- "https://github.com/rand0midas/randomideas" ,
472236 "https://github.com/rapid7/metasploit-framework" ,
473- "https://github.com/riteshgohil/My_CVE_References" ,
474- "https://github.com/rohit0x5/poc" ,
475- "https://github.com/rsrahulsingh05/POC" ,
476- "https://github.com/rtcrowley/poc" ,
477- "https://github.com/rumble773/sec-research" ,
478- "https://github.com/Ryan0lb/EC-cloud-e-commerce-system-CVE-application" ,
479- "https://github.com/s1kr10s/EasyChatServer-DOS" ,
480- "https://github.com/saitamang/POC-DUMP" ,
481- "https://github.com/sartlabs/0days" ,
482- "https://github.com/SaumyajeetDas/POC-of-CVE-2022-36271" ,
483- "https://github.com/SaumyajeetDas/Vulnerability" ,
484- "https://github.com/secf0ra11/secf0ra11.github.io" ,
485- "https://github.com/Security-AVS/-CVE-2021-26904" ,
486- "https://github.com/seizer-zyx/Vulnerability" ,
487- "https://github.com/seqred-s-a/gxdlmsdirector-cve" ,
488- "https://github.com/Serces-X/vul_report" ,
489- "https://github.com/shellshok3/Cross-Site-Scripting-XSS" ,
490- "https://github.com/sickcodes/security" ,
491- "https://github.com/silence-silence/xxl-job-lateral-privilege-escalation-vulnerability-" ,
492- "https://github.com/sinemsahn/POC" ,
493- "https://github.com/sleepyvv/vul_report" ,
494- "https://github.com/smurf-reigz/security" ,
495- "https://github.com/Snakinya/Vuln" ,
496- "https://github.com/snyk/zip-slip-vulnerability" ,
497- "https://github.com/soheilsamanabadi/vulnerability" ,
498- "https://github.com/soheilsamanabadi/vulnerabilitys" ,
499- "https://github.com/Sospiro014/zday1" ,
500- "https://github.com/soundarkutty/stored-xss" ,
501- "https://github.com/souravkr529/CSRF-in-Cold-Storage-Management-System" ,
502- "https://github.com/spwpun/ntp-4.2.8p15-cves" ,
503- "https://github.com/sromanhu/Cmsmadesimple-CMS-Stored-XSS" ,
504- "https://github.com/sromanhu/CMSmadesimple-File-Upload--XSS---File-Manager" ,
505- "https://github.com/sromanhu/CSZ-CMS-Stored-XSS---Pages-Content" ,
506- "https://github.com/sromanhu/e107-CMS-Stored-XSS---Manage" ,
507- "https://github.com/sromanhu/RiteCMS-Stored-XSS---Home" ,
508237 "https://github.com/starnightcyber/miscellaneous" ,
509- "https://github.com/strangebeecorp/security" ,
510- "https://github.com/strik3r0x1/Vulns" ,
511- "https://github.com/sunset-move/EasyImages2.0-arbitrary-file-download-vulnerability" ,
512- "https://github.com/SunshineOtaku/Report-CVE" ,
513- "https://github.com/superkojiman/vulnerabilities" ,
514- "https://github.com/sweatxi/BugHub" ,
515- "https://github.com/TCSWT/Baby-Care-System" ,
516- "https://github.com/thehackingverse/Stored-xss-" ,
517- "https://github.com/theyiyibest/Reflected-XSS-on-SockJS" ,
518- "https://github.com/thisissuperann/Vul" ,
519- "https://github.com/TimeSeg/IOT_CVE" ,
520- "https://github.com/TishaManandhar/Superstore-sql-poc" ,
521- "https://github.com/toyydsBT123/One_of_my_take_on_SourceCodester" ,
522- "https://github.com/transcendent-group/advisories" ,
523- "https://github.com/tremwil/ds3-nrssr-rce" ,
524- "https://github.com/trinity-syt-security/xss_vuln_issue" ,
525- "https://github.com/Trinity-SYT-SECURITY/XSS_vuln_issue" ,
526- "https://github.com/uBlockOrigin/uBlock-issues" ,
527- "https://github.com/umarfarook882/avast_multiple_vulnerability_disclosure" ,
528- "https://github.com/v2ish1yan/mycve" ,
529- "https://github.com/V3geD4g/cmseasy_vul" ,
530- "https://github.com/verf1sh/Poc" ,
531- "https://github.com/versprite/research" ,
532- "https://github.com/VistaAX/vulnerablility" ,
533- "https://github.com/vQAQv/Request-CVE-ID-PoC" ,
534- "https://github.com/vulnerabilities-cve/vulnerabilities" ,
535- "https://github.com/vuls/vuls" ,
536- "https://github.com/wagnerdracha/ProofOfConcept" ,
537- "https://github.com/wandera/public-disclosures" ,
538- "https://github.com/Wh04m1001/ZoneAlarmEoP" ,
539- "https://github.com/whiex/c2Rhc2Rhc2Q-" ,
540- "https://github.com/whitehatl/Vulnerability" ,
541- "https://github.com/wind-cyber/LJCMS-UserTraversal-Vulnerability" ,
542- "https://github.com/wkeyi0x1/vul-report" ,
543- "https://github.com/wsummerhill/BSA-Radar_CVE-Vulnerabilities" ,
544- "https://github.com/xcodeOn1/xcode0x-CVEs" ,
545- "https://github.com/XiLitter/CMS_vulnerability-discovery" ,
546- "https://github.com/xnobody12/jaws-cms-rce" ,
547- "https://github.com/Xor-Gerke/webray.com.cn" ,
548- "https://github.com/xuanluansec/vul" ,
549- "https://github.com/xunyang1/my-vulnerability" ,
550- "https://github.com/xxhzz1/74cmsSE-Arbitrary-file-upload-vulnerability" ,
551- "https://github.com/y1s3m0/vulnfind" ,
552- "https://github.com/yasinyildiz26/Badminton-Center-Management-System" ,
553- "https://github.com/YavuzSahbaz/Limbas-4.3.36.1319-is-vulnerable-to-Cross-Site-Scripting-XSS-" ,
554- "https://github.com/YavuzSahbaz/Red-Planet-Laundry-Management-System-1.0-is-vulnerable-to-SQL" ,
555- "https://github.com/ycdxsb/Vuln" ,
556- "https://github.com/ykosan1/Simple-Task-Scheduling-System-id-SQL-Injection-Unauthenticated" ,
557- "https://github.com/YLoiK/74cmsSE-Arbitrary-file-upload-vulnerability" ,
558- "https://github.com/Yu1e/vuls" ,
559- "https://github.com/YZLCQX/Mailbox-remote-command-execution" ,
560- "https://github.com/z00z00z00/Safenet_SAC_CVE-2021-42056" ,
561- "https://github.com/zerrr0/Zerrr0_Vulnerability" ,
562- "https://github.com/Zeyad-Azima/Issabel-stored-XSS" ,
563- "https://github.com/ZhuoNiBa/Delta-DIAEnergie-XSS" ,
564- "https://github.com/ZJQcicadawings/VulSql" ,
565- "https://github.com/Zoe0427/YJCMS" ,
566- "https://github.com/zzh-newlearner/record" ,
567- "https://gitlab.com/-/snippets/1937042" ,
568- "https://gitlab.com/FallFur/exploiting-unprotected-admin-funcionalities-on-besder-ip-cameras" ,
569238 "https://gitlab.com/gitlab-org/gitlab-ce" , // redirects to gitlab-foss
570239 "https://gitlab.com/gitlab-org/gitlab-ee" , // redirects to gitlab
571240 "https://gitlab.com/gitlab-org/gitlab-foss" , // not the canonical source
572241 "https://gitlab.com/gitlab-org/omnibus-gitlab" , // not the source
573- "https://gitlab.com/gitlab-org/release" , // not the source
574- "https://gitlab.com/kop316/vvm-disclosure" ,
575- "https://gitlab.com/yongchuank/avast-aswsnx-ioctl-82ac0060-oob-write" ,
576242 }
577243 InvalidRepoRegex = `(?i)/(?:(?:CVEs?)|(?:CVE-\d{4}-\d{4,})(?:/?.*)?|bug_report(?:/.*)?|GitHubAssessments/.*)`
578244)
0 commit comments