2022-05-05 14:17:36 +02:00
[
{
"id" : 488929451 ,
"name" : "CVE-2022-1388" ,
"full_name" : "numanturle\/CVE-2022-1388" ,
"owner" : {
"login" : "numanturle" ,
"id" : 7007951 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/7007951?v=4" ,
"html_url" : "https:\/\/github.com\/numanturle"
} ,
"html_url" : "https:\/\/github.com\/numanturle\/CVE-2022-1388" ,
"description" : "K23605346: BIG-IP iControl REST vulnerability CVE-2022-1388" ,
"fork" : false ,
"created_at" : "2022-05-05T10:35:35Z" ,
2022-05-08 20:15:23 +02:00
"updated_at" : "2022-05-08T14:41:43Z" ,
2022-05-05 14:17:36 +02:00
"pushed_at" : "2022-05-05T10:44:36Z" ,
2022-05-08 20:15:23 +02:00
"stargazers_count" : 11 ,
"watchers_count" : 11 ,
2022-05-07 14:15:16 +02:00
"forks_count" : 6 ,
2022-05-05 20:15:37 +02:00
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
2022-05-07 14:15:16 +02:00
"forks" : 6 ,
2022-05-08 20:15:23 +02:00
"watchers" : 11 ,
2022-05-05 20:15:37 +02:00
"score" : 0
} ,
{
"id" : 489015664 ,
"name" : "CVE-2022-1388-POC" ,
"full_name" : "TomArni680\/CVE-2022-1388-POC" ,
"owner" : {
"login" : "TomArni680" ,
"id" : 104999480 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/104999480?v=4" ,
"html_url" : "https:\/\/github.com\/TomArni680"
} ,
"html_url" : "https:\/\/github.com\/TomArni680\/CVE-2022-1388-POC" ,
"description" : "BIG-IP iCONTROL REST AUTH BYPASS RCE POC CVE-2022-1388" ,
"fork" : false ,
"created_at" : "2022-05-05T14:55:45Z" ,
2022-05-07 20:15:01 +02:00
"updated_at" : "2022-05-07T16:46:52Z" ,
2022-05-05 20:15:37 +02:00
"pushed_at" : "2022-05-05T15:30:37Z" ,
2022-05-05 14:17:36 +02:00
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
2022-05-07 08:15:18 +02:00
"forks_count" : 1 ,
2022-05-05 20:15:37 +02:00
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
2022-05-07 08:15:18 +02:00
"forks" : 1 ,
2022-05-05 20:15:37 +02:00
"watchers" : 0 ,
"score" : 0
} ,
{
"id" : 489026843 ,
"name" : "CVE-2022-1388-checker" ,
"full_name" : "jheeree\/CVE-2022-1388-checker" ,
"owner" : {
"login" : "jheeree" ,
"id" : 19227591 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/19227591?v=4" ,
"html_url" : "https:\/\/github.com\/jheeree"
} ,
"html_url" : "https:\/\/github.com\/jheeree\/CVE-2022-1388-checker" ,
"description" : "Simple script realizado en bash, para revisión de múltiples hosts para CVE-2022-1388 (F5)" ,
"fork" : false ,
"created_at" : "2022-05-05T15:25:53Z" ,
2022-05-08 14:15:10 +02:00
"updated_at" : "2022-05-08T08:58:52Z" ,
2022-05-06 02:15:09 +02:00
"pushed_at" : "2022-05-05T22:49:40Z" ,
2022-05-08 14:15:10 +02:00
"stargazers_count" : 16 ,
"watchers_count" : 16 ,
"forks_count" : 9 ,
2022-05-05 14:17:36 +02:00
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
2022-05-08 14:15:10 +02:00
"forks" : 9 ,
"watchers" : 16 ,
2022-05-06 14:15:38 +02:00
"score" : 0
} ,
{
"id" : 489240417 ,
"name" : "Nuclei-Template-CVE-2022-1388-BIG-IP-iControl-REST-Exposed" ,
"full_name" : "MrCl0wnLab\/Nuclei-Template-CVE-2022-1388-BIG-IP-iControl-REST-Exposed" ,
"owner" : {
"login" : "MrCl0wnLab" ,
"id" : 17049332 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/17049332?v=4" ,
"html_url" : "https:\/\/github.com\/MrCl0wnLab"
} ,
"html_url" : "https:\/\/github.com\/MrCl0wnLab\/Nuclei-Template-CVE-2022-1388-BIG-IP-iControl-REST-Exposed" ,
"description" : "This vulnerability may allow an unauthenticated attacker with network access to the BIG-IP system through the management port and\/or self IP addresses to execute arbitrary system commands, create or delete files, or disable services. There is no data plane exposure; this is a control plane issue only." ,
"fork" : false ,
"created_at" : "2022-05-06T06:22:47Z" ,
2022-05-08 14:15:10 +02:00
"updated_at" : "2022-05-08T11:09:03Z" ,
2022-05-06 20:16:29 +02:00
"pushed_at" : "2022-05-06T15:33:14Z" ,
2022-05-08 14:15:10 +02:00
"stargazers_count" : 10 ,
"watchers_count" : 10 ,
2022-05-07 08:15:18 +02:00
"forks_count" : 4 ,
2022-05-06 14:15:38 +02:00
"allow_forking" : true ,
"is_template" : false ,
"topics" : [
"bigip" ,
"bigip-rest-api" ,
"cve-2022-1388" ,
"nuclei" ,
"nuclei-detection" ,
"nuclei-templates"
] ,
"visibility" : "public" ,
2022-05-07 08:15:18 +02:00
"forks" : 4 ,
2022-05-08 14:15:10 +02:00
"watchers" : 10 ,
2022-05-07 20:15:01 +02:00
"score" : 0
} ,
{
"id" : 489669248 ,
"name" : "westone-CVE-2022-1388-scanner" ,
"full_name" : "Osyanina\/westone-CVE-2022-1388-scanner" ,
"owner" : {
"login" : "Osyanina" ,
"id" : 78467376 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/78467376?v=4" ,
"html_url" : "https:\/\/github.com\/Osyanina"
} ,
"html_url" : "https:\/\/github.com\/Osyanina\/westone-CVE-2022-1388-scanner" ,
"description" : "A vulnerability scanner that detects CVE-2021-21980 vulnerabilities." ,
"fork" : false ,
"created_at" : "2022-05-07T12:36:41Z" ,
"updated_at" : "2022-05-07T12:37:01Z" ,
"pushed_at" : "2022-05-07T12:41:34Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
} ,
{
"id" : 489745068 ,
"name" : "F5-BIG-IP-RCE-Check" ,
"full_name" : "bytecaps\/F5-BIG-IP-RCE-Check" ,
"owner" : {
"login" : "bytecaps" ,
"id" : 52679771 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/52679771?v=4" ,
"html_url" : "https:\/\/github.com\/bytecaps"
} ,
"html_url" : "https:\/\/github.com\/bytecaps\/F5-BIG-IP-RCE-Check" ,
"description" : "CVE-2022-1388 F5 BIG-IP iControl Rest API exposed RCE Check" ,
"fork" : false ,
"created_at" : "2022-05-07T17:54:08Z" ,
"updated_at" : "2022-05-07T17:54:14Z" ,
2022-05-08 14:15:10 +02:00
"pushed_at" : "2022-05-08T11:41:37Z" ,
2022-05-07 20:15:01 +02:00
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
} ,
{
"id" : 489746944 ,
"name" : "CVE-2022-1388-RCE" ,
"full_name" : "TomArni680\/CVE-2022-1388-RCE" ,
"owner" : {
"login" : "TomArni680" ,
"id" : 104999480 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/104999480?v=4" ,
"html_url" : "https:\/\/github.com\/TomArni680"
} ,
"html_url" : "https:\/\/github.com\/TomArni680\/CVE-2022-1388-RCE" ,
"description" : "BIG-IP iCONTROL REST AUTH BYPASS RCE POC CVE-2022-1388" ,
"fork" : false ,
"created_at" : "2022-05-07T18:02:55Z" ,
2022-05-08 14:15:10 +02:00
"updated_at" : "2022-05-08T07:07:08Z" ,
2022-05-07 20:15:01 +02:00
"pushed_at" : "2022-05-07T18:05:27Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
2022-05-05 14:17:36 +02:00
"score" : 0
2022-05-08 14:15:10 +02:00
} ,
{
"id" : 489899447 ,
"name" : "CVE-2022-1388-RCE-checker" ,
"full_name" : "blind-intruder\/CVE-2022-1388-RCE-checker" ,
"owner" : {
"login" : "blind-intruder" ,
"id" : 41877347 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/41877347?v=4" ,
"html_url" : "https:\/\/github.com\/blind-intruder"
} ,
"html_url" : "https:\/\/github.com\/blind-intruder\/CVE-2022-1388-RCE-checker" ,
"description" : null ,
"fork" : false ,
"created_at" : "2022-05-08T09:28:19Z" ,
"updated_at" : "2022-05-08T09:28:49Z" ,
"pushed_at" : "2022-05-08T09:29:32Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
2022-05-05 14:17:36 +02:00
}
]