Auto Update 2025/03/01 18:31:45

This commit is contained in:
motikan2010-bot 2025-03-02 03:31:45 +09:00
parent 092967fe4f
commit 6928546ce5
28 changed files with 144 additions and 134 deletions

View file

@ -85,23 +85,23 @@
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/z-bool\/Venom-JWT",
"description": "针对JWT渗透开发的漏洞验证\/密钥爆破工具针对CVE-2015-9235\/未验证签名攻击\/CVE-2016-10555\/CVE-2018-0114\/CVE-2020-28042的结果生成用于FUZZ也可使用字典\/字符枚举(包括JJWT)的方式进行爆破",
"description": "针对JWT渗透开发的漏洞验证\/密钥爆破工具针对CVE-2015-9235\/未验证签名攻击\/CVE-2016-10555\/CVE-2018-0114\/CVE-2020-28042的结果生成用于FUZZ也可使用字典\/字符枚举(包括JJWT)的方式进行爆破(JWT Crack)",
"fork": false,
"created_at": "2025-01-27T14:23:31Z",
"updated_at": "2025-03-01T09:00:16Z",
"pushed_at": "2025-02-28T16:49:20Z",
"stargazers_count": 63,
"watchers_count": 63,
"updated_at": "2025-03-01T15:46:49Z",
"pushed_at": "2025-03-01T15:46:45Z",
"stargazers_count": 71,
"watchers_count": 71,
"has_discussions": false,
"forks_count": 2,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 63,
"forks": 3,
"watchers": 71,
"score": 0,
"subscribers_count": 1
"subscribers_count": 2
}
]

View file

@ -73,23 +73,23 @@
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/z-bool\/Venom-JWT",
"description": "针对JWT渗透开发的漏洞验证\/密钥爆破工具针对CVE-2015-9235\/未验证签名攻击\/CVE-2016-10555\/CVE-2018-0114\/CVE-2020-28042的结果生成用于FUZZ也可使用字典\/字符枚举(包括JJWT)的方式进行爆破",
"description": "针对JWT渗透开发的漏洞验证\/密钥爆破工具针对CVE-2015-9235\/未验证签名攻击\/CVE-2016-10555\/CVE-2018-0114\/CVE-2020-28042的结果生成用于FUZZ也可使用字典\/字符枚举(包括JJWT)的方式进行爆破(JWT Crack)",
"fork": false,
"created_at": "2025-01-27T14:23:31Z",
"updated_at": "2025-03-01T09:00:16Z",
"pushed_at": "2025-02-28T16:49:20Z",
"stargazers_count": 63,
"watchers_count": 63,
"updated_at": "2025-03-01T15:46:49Z",
"pushed_at": "2025-03-01T15:46:45Z",
"stargazers_count": 71,
"watchers_count": 71,
"has_discussions": false,
"forks_count": 2,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 63,
"forks": 3,
"watchers": 71,
"score": 0,
"subscribers_count": 1
"subscribers_count": 2
}
]

View file

@ -307,11 +307,11 @@
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/dream434\/CVE-2017-9841-",
"description": null,
"description": "CVE-2017-9841",
"fork": false,
"created_at": "2022-11-21T16:36:48Z",
"updated_at": "2025-02-22T19:16:59Z",
"pushed_at": "2025-02-22T19:16:57Z",
"updated_at": "2025-03-01T16:45:32Z",
"pushed_at": "2025-03-01T16:45:29Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
@ -319,7 +319,9 @@
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"topics": [
"the-cve-2017-9841-exploit"
],
"visibility": "public",
"forks": 0,
"watchers": 1,

View file

@ -321,23 +321,23 @@
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/z-bool\/Venom-JWT",
"description": "针对JWT渗透开发的漏洞验证\/密钥爆破工具针对CVE-2015-9235\/未验证签名攻击\/CVE-2016-10555\/CVE-2018-0114\/CVE-2020-28042的结果生成用于FUZZ也可使用字典\/字符枚举(包括JJWT)的方式进行爆破",
"description": "针对JWT渗透开发的漏洞验证\/密钥爆破工具针对CVE-2015-9235\/未验证签名攻击\/CVE-2016-10555\/CVE-2018-0114\/CVE-2020-28042的结果生成用于FUZZ也可使用字典\/字符枚举(包括JJWT)的方式进行爆破(JWT Crack)",
"fork": false,
"created_at": "2025-01-27T14:23:31Z",
"updated_at": "2025-03-01T09:00:16Z",
"pushed_at": "2025-02-28T16:49:20Z",
"stargazers_count": 63,
"watchers_count": 63,
"updated_at": "2025-03-01T15:46:49Z",
"pushed_at": "2025-03-01T15:46:45Z",
"stargazers_count": 71,
"watchers_count": 71,
"has_discussions": false,
"forks_count": 2,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 63,
"forks": 3,
"watchers": 71,
"score": 0,
"subscribers_count": 1
"subscribers_count": 2
}
]

View file

@ -28,6 +28,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -369,6 +369,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -11,22 +11,22 @@
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/z-bool\/Venom-JWT",
"description": "针对JWT渗透开发的漏洞验证\/密钥爆破工具针对CVE-2015-9235\/未验证签名攻击\/CVE-2016-10555\/CVE-2018-0114\/CVE-2020-28042的结果生成用于FUZZ也可使用字典\/字符枚举(包括JJWT)的方式进行爆破",
"description": "针对JWT渗透开发的漏洞验证\/密钥爆破工具针对CVE-2015-9235\/未验证签名攻击\/CVE-2016-10555\/CVE-2018-0114\/CVE-2020-28042的结果生成用于FUZZ也可使用字典\/字符枚举(包括JJWT)的方式进行爆破(JWT Crack)",
"fork": false,
"created_at": "2025-01-27T14:23:31Z",
"updated_at": "2025-03-01T09:00:16Z",
"pushed_at": "2025-02-28T16:49:20Z",
"stargazers_count": 63,
"watchers_count": 63,
"updated_at": "2025-03-01T15:46:49Z",
"pushed_at": "2025-03-01T15:46:45Z",
"stargazers_count": 71,
"watchers_count": 71,
"has_discussions": false,
"forks_count": 2,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 63,
"forks": 3,
"watchers": 71,
"score": 0,
"subscribers_count": 1
}

View file

@ -316,13 +316,13 @@
"stargazers_count": 1038,
"watchers_count": 1038,
"has_discussions": false,
"forks_count": 231,
"forks_count": 230,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 231,
"forks": 230,
"watchers": 1038,
"score": 0,
"subscribers_count": 26

View file

@ -577,15 +577,15 @@
{
"id": 468414500,
"name": "CVE-2021-22205-gitlab",
"full_name": "al4xs\/CVE-2021-22205-gitlab",
"full_name": "osungjinwoo\/CVE-2021-22205-gitlab",
"owner": {
"login": "al4xs",
"login": "osungjinwoo",
"id": 40411471,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/40411471?v=4",
"html_url": "https:\/\/github.com\/al4xs",
"html_url": "https:\/\/github.com\/osungjinwoo",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/al4xs\/CVE-2021-22205-gitlab",
"html_url": "https:\/\/github.com\/osungjinwoo\/CVE-2021-22205-gitlab",
"description": null,
"fork": false,
"created_at": "2022-03-10T16:03:47Z",

View file

@ -45,10 +45,10 @@
"description": null,
"fork": false,
"created_at": "2021-08-31T23:33:44Z",
"updated_at": "2025-01-03T19:15:28Z",
"updated_at": "2025-03-01T16:23:32Z",
"pushed_at": "2021-09-01T01:01:06Z",
"stargazers_count": 53,
"watchers_count": 53,
"stargazers_count": 54,
"watchers_count": 54,
"has_discussions": false,
"forks_count": 17,
"allow_forking": true,
@ -57,7 +57,7 @@
"topics": [],
"visibility": "public",
"forks": 17,
"watchers": 53,
"watchers": 54,
"score": 0,
"subscribers_count": 5
},

View file

@ -19,13 +19,13 @@
"stargazers_count": 77,
"watchers_count": 77,
"has_discussions": false,
"forks_count": 63,
"forks_count": 62,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 63,
"forks": 62,
"watchers": 77,
"score": 0,
"subscribers_count": 3

View file

@ -236,13 +236,13 @@
"stargazers_count": 1613,
"watchers_count": 1613,
"has_discussions": false,
"forks_count": 483,
"forks_count": 482,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 483,
"forks": 482,
"watchers": 1613,
"score": 0,
"subscribers_count": 28

View file

@ -1271,10 +1271,10 @@
"description": "Automated Exploit Tool for Grafana CVE-2021-43798: Scanning common files that contain juicy informations and extracting SSH keys from compromised users.",
"fork": false,
"created_at": "2024-12-14T14:06:59Z",
"updated_at": "2024-12-15T14:00:48Z",
"updated_at": "2025-03-01T14:13:54Z",
"pushed_at": "2024-12-14T17:30:12Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -1283,7 +1283,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 1
},

View file

@ -138,19 +138,19 @@
"description": "CVE-2022-0847 exploit one liner",
"fork": false,
"created_at": "2022-03-07T20:57:34Z",
"updated_at": "2022-12-09T22:58:15Z",
"updated_at": "2025-03-01T17:57:53Z",
"pushed_at": "2022-03-07T21:01:15Z",
"stargazers_count": 8,
"watchers_count": 8,
"stargazers_count": 9,
"watchers_count": 9,
"has_discussions": false,
"forks_count": 5,
"forks_count": 6,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 8,
"forks": 6,
"watchers": 9,
"score": 0,
"subscribers_count": 1
},
@ -996,15 +996,15 @@
{
"id": 468416712,
"name": "CVE-2022-0847-Dirty-Pipe",
"full_name": "al4xs\/CVE-2022-0847-Dirty-Pipe",
"full_name": "osungjinwoo\/CVE-2022-0847-Dirty-Pipe",
"owner": {
"login": "al4xs",
"login": "osungjinwoo",
"id": 40411471,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/40411471?v=4",
"html_url": "https:\/\/github.com\/al4xs",
"html_url": "https:\/\/github.com\/osungjinwoo",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/al4xs\/CVE-2022-0847-Dirty-Pipe",
"html_url": "https:\/\/github.com\/osungjinwoo\/CVE-2022-0847-Dirty-Pipe",
"description": null,
"fork": false,
"created_at": "2022-03-10T16:09:16Z",

View file

@ -19,13 +19,13 @@
"stargazers_count": 497,
"watchers_count": 497,
"has_discussions": false,
"forks_count": 70,
"forks_count": 67,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 70,
"forks": 67,
"watchers": 497,
"score": 0,
"subscribers_count": 8

View file

@ -19,7 +19,7 @@
"stargazers_count": 41,
"watchers_count": 41,
"has_discussions": false,
"forks_count": 6,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -31,7 +31,7 @@
"prestashop"
],
"visibility": "public",
"forks": 6,
"forks": 5,
"watchers": 41,
"score": 0,
"subscribers_count": 10

33
2022/CVE-2022-38532.json Normal file
View file

@ -0,0 +1,33 @@
[
{
"id": 525183970,
"name": "msi-central_privesc",
"full_name": "nam3lum\/msi-central_privesc",
"owner": {
"login": "nam3lum",
"id": 64528432,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/64528432?v=4",
"html_url": "https:\/\/github.com\/nam3lum",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/nam3lum\/msi-central_privesc",
"description": "CVE-2022-38532 - Local Privilege Escalation vulnerability in MSI Center Application",
"fork": false,
"created_at": "2022-08-16T00:49:19Z",
"updated_at": "2025-03-01T15:30:14Z",
"pushed_at": "2025-02-22T00:06:43Z",
"stargazers_count": 7,
"watchers_count": 7,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 7,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -14,10 +14,10 @@
"description": "nps认证绕过利用工具CVE-2022-40494使用此工具可在浏览器访问web控制端后台页面或者批量获取socks5和http代理",
"fork": false,
"created_at": "2022-08-04T08:22:41Z",
"updated_at": "2025-01-07T00:57:14Z",
"updated_at": "2025-03-01T16:01:01Z",
"pushed_at": "2022-08-19T09:04:09Z",
"stargazers_count": 301,
"watchers_count": 301,
"stargazers_count": 302,
"watchers_count": 302,
"has_discussions": false,
"forks_count": 39,
"allow_forking": true,
@ -34,7 +34,7 @@
],
"visibility": "public",
"forks": 39,
"watchers": 301,
"watchers": 302,
"score": 0,
"subscribers_count": 6
}

View file

@ -19,13 +19,13 @@
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 1,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"forks": 2,
"watchers": 1,
"score": 0,
"subscribers_count": 1

View file

@ -14,7 +14,7 @@
"description": "A small write-up with examples to understand CVE-2023-43115",
"fork": false,
"created_at": "2023-09-28T17:30:06Z",
"updated_at": "2024-04-09T19:00:53Z",
"updated_at": "2025-03-01T17:57:40Z",
"pushed_at": "2023-12-26T15:37:47Z",
"stargazers_count": 8,
"watchers_count": 8,

View file

@ -568,36 +568,5 @@
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 939996985,
"name": "CVE-2024-36401",
"full_name": "wingedmicroph\/CVE-2024-36401",
"owner": {
"login": "wingedmicroph",
"id": 199152414,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/199152414?v=4",
"html_url": "https:\/\/github.com\/wingedmicroph",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/wingedmicroph\/CVE-2024-36401",
"description": "geoserver图形化漏洞利用工具",
"fork": false,
"created_at": "2025-02-27T12:58:15Z",
"updated_at": "2025-02-27T13:58:06Z",
"pushed_at": "2025-02-27T12:58:19Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -14,10 +14,10 @@
"description": "Makes IDA (most versions) to crash upon opening it. ",
"fork": false,
"created_at": "2024-08-25T12:33:14Z",
"updated_at": "2025-02-11T17:10:18Z",
"updated_at": "2025-03-01T16:40:48Z",
"pushed_at": "2024-08-30T09:58:12Z",
"stargazers_count": 82,
"watchers_count": 82,
"stargazers_count": 80,
"watchers_count": 80,
"has_discussions": false,
"forks_count": 7,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 7,
"watchers": 82,
"watchers": 80,
"score": 0,
"subscribers_count": 2
}

View file

@ -2118,10 +2118,10 @@
"description": "Remote Unauthenticated Code Execution Vulnerability in OpenSSH server (CVE-2024-6387)",
"fork": false,
"created_at": "2024-07-08T11:27:49Z",
"updated_at": "2025-02-27T15:12:39Z",
"updated_at": "2025-03-01T13:27:24Z",
"pushed_at": "2024-08-22T08:50:25Z",
"stargazers_count": 85,
"watchers_count": 85,
"stargazers_count": 86,
"watchers_count": 86,
"has_discussions": false,
"forks_count": 32,
"allow_forking": true,
@ -2130,7 +2130,7 @@
"topics": [],
"visibility": "public",
"forks": 32,
"watchers": 85,
"watchers": 86,
"score": 0,
"subscribers_count": 4
},

View file

@ -14,10 +14,10 @@
"description": "Poc exploit for CVE-2025-21333 heap-based buffer overflow. It leverages WNF state data and I\/O ring IOP_MC_BUFFER_ENTRY",
"fork": false,
"created_at": "2025-02-27T12:36:55Z",
"updated_at": "2025-03-01T11:11:59Z",
"updated_at": "2025-03-01T18:24:34Z",
"pushed_at": "2025-02-27T14:37:39Z",
"stargazers_count": 51,
"watchers_count": 51,
"stargazers_count": 55,
"watchers_count": 55,
"has_discussions": false,
"forks_count": 15,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 15,
"watchers": 51,
"watchers": 55,
"score": 0,
"subscribers_count": 0
}

View file

@ -14,10 +14,10 @@
"description": "Proof of Concept (POC) for the CVE-2025-25296 vulnerability affecting Label Studio versions prior to 1.16.0",
"fork": false,
"created_at": "2025-03-01T02:08:01Z",
"updated_at": "2025-03-01T02:09:10Z",
"updated_at": "2025-03-01T14:08:33Z",
"pushed_at": "2025-03-01T02:09:07Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 0
}

View file

@ -11,10 +11,10 @@
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/A17-ba\/CVE-2025-26202-Details",
"description": null,
"description": "CVE-2025-26202",
"fork": false,
"created_at": "2025-03-01T12:05:27Z",
"updated_at": "2025-03-01T12:17:07Z",
"updated_at": "2025-03-01T12:50:08Z",
"pushed_at": "2025-03-01T12:17:04Z",
"stargazers_count": 0,
"watchers_count": 0,

View file

@ -14,8 +14,8 @@
"description": "Critical security vulnerability in NVDA remote connection add-ons.",
"fork": false,
"created_at": "2025-02-25T21:04:45Z",
"updated_at": "2025-02-25T21:07:06Z",
"pushed_at": "2025-02-25T21:07:02Z",
"updated_at": "2025-03-01T13:02:51Z",
"pushed_at": "2025-03-01T13:02:48Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -6298,7 +6298,6 @@
- [0x0d3ad/CVE-2024-36401](https://github.com/0x0d3ad/CVE-2024-36401)
- [whitebear-ch/GeoServerExploit](https://github.com/whitebear-ch/GeoServerExploit)
- [unlinedvol/CVE-2024-36401](https://github.com/unlinedvol/CVE-2024-36401)
- [wingedmicroph/CVE-2024-36401](https://github.com/wingedmicroph/CVE-2024-36401)
### CVE-2024-36416 (2024-06-10)
@ -18400,7 +18399,7 @@
- [edsonjt81/CVE-2022-0847-Linux](https://github.com/edsonjt81/CVE-2022-0847-Linux)
- [chenaotian/CVE-2022-0847](https://github.com/chenaotian/CVE-2022-0847)
- [V0WKeep3r/CVE-2022-0847-DirtyPipe-Exploit](https://github.com/V0WKeep3r/CVE-2022-0847-DirtyPipe-Exploit)
- [al4xs/CVE-2022-0847-Dirty-Pipe](https://github.com/al4xs/CVE-2022-0847-Dirty-Pipe)
- [osungjinwoo/CVE-2022-0847-Dirty-Pipe](https://github.com/osungjinwoo/CVE-2022-0847-Dirty-Pipe)
- [Greetdawn/CVE-2022-0847-DirtyPipe-](https://github.com/Greetdawn/CVE-2022-0847-DirtyPipe-)
- [crusoe112/DirtyPipePython](https://github.com/crusoe112/DirtyPipePython)
- [nanaao/dirtyPipe-automaticRoot](https://github.com/nanaao/dirtyPipe-automaticRoot)
@ -23338,6 +23337,13 @@
- [azhurtanov/CVE-2022-38374](https://github.com/azhurtanov/CVE-2022-38374)
- [M4fiaB0y/CVE-2022-38374](https://github.com/M4fiaB0y/CVE-2022-38374)
### CVE-2022-38532 (2022-09-19)
<code>Micro-Star International Co., Ltd MSI Center 1.0.50.0 was discovered to contain a vulnerability in the component C_Features of MSI.CentralServer.exe. This vulnerability allows attackers to escalate privileges via running a crafted executable.
</code>
- [nam3lum/msi-central_privesc](https://github.com/nam3lum/msi-central_privesc)
### CVE-2022-38553 (2022-09-26)
<code>Academy Learning Management System before v5.9.1 was discovered to contain a reflected cross-site scripting (XSS) vulnerability via the Search parameter.
@ -26909,7 +26915,7 @@
- [pizza-power/Golang-CVE-2021-22205-POC](https://github.com/pizza-power/Golang-CVE-2021-22205-POC)
- [DIVD-NL/GitLab-cve-2021-22205-nse](https://github.com/DIVD-NL/GitLab-cve-2021-22205-nse)
- [w0x68y/Gitlab-CVE-2021-22205](https://github.com/w0x68y/Gitlab-CVE-2021-22205)
- [al4xs/CVE-2021-22205-gitlab](https://github.com/al4xs/CVE-2021-22205-gitlab)
- [osungjinwoo/CVE-2021-22205-gitlab](https://github.com/osungjinwoo/CVE-2021-22205-gitlab)
- [honypot/CVE-2021-22205](https://github.com/honypot/CVE-2021-22205)
- [momika233/cve-2021-22205-GitLab-13.10.2---Remote-Code-Execution-RCE-Unauthenticated-](https://github.com/momika233/cve-2021-22205-GitLab-13.10.2---Remote-Code-Execution-RCE-Unauthenticated-)
- [keven1z/CVE-2021-22205](https://github.com/keven1z/CVE-2021-22205)