PoC-in-GitHub/2022/CVE-2022-1388.json

225 lines
8 KiB
JSON
Raw Normal View History

2022-05-05 14:17:36 +02:00
[
{
"id": 488929451,
"name": "CVE-2022-1388",
"full_name": "numanturle\/CVE-2022-1388",
"owner": {
"login": "numanturle",
"id": 7007951,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7007951?v=4",
"html_url": "https:\/\/github.com\/numanturle"
},
"html_url": "https:\/\/github.com\/numanturle\/CVE-2022-1388",
"description": "K23605346: BIG-IP iControl REST vulnerability CVE-2022-1388",
"fork": false,
"created_at": "2022-05-05T10:35:35Z",
2022-05-08 20:15:23 +02:00
"updated_at": "2022-05-08T14:41:43Z",
2022-05-05 14:17:36 +02:00
"pushed_at": "2022-05-05T10:44:36Z",
2022-05-08 20:15:23 +02:00
"stargazers_count": 11,
"watchers_count": 11,
2022-05-07 14:15:16 +02:00
"forks_count": 6,
2022-05-05 20:15:37 +02:00
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
2022-05-07 14:15:16 +02:00
"forks": 6,
2022-05-08 20:15:23 +02:00
"watchers": 11,
2022-05-05 20:15:37 +02:00
"score": 0
},
{
"id": 489015664,
"name": "CVE-2022-1388-POC",
"full_name": "TomArni680\/CVE-2022-1388-POC",
"owner": {
"login": "TomArni680",
"id": 104999480,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/104999480?v=4",
"html_url": "https:\/\/github.com\/TomArni680"
},
"html_url": "https:\/\/github.com\/TomArni680\/CVE-2022-1388-POC",
"description": "BIG-IP iCONTROL REST AUTH BYPASS RCE POC CVE-2022-1388",
"fork": false,
"created_at": "2022-05-05T14:55:45Z",
2022-05-07 20:15:01 +02:00
"updated_at": "2022-05-07T16:46:52Z",
2022-05-05 20:15:37 +02:00
"pushed_at": "2022-05-05T15:30:37Z",
2022-05-05 14:17:36 +02:00
"stargazers_count": 0,
"watchers_count": 0,
2022-05-07 08:15:18 +02:00
"forks_count": 1,
2022-05-05 20:15:37 +02:00
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
2022-05-07 08:15:18 +02:00
"forks": 1,
2022-05-05 20:15:37 +02:00
"watchers": 0,
"score": 0
},
{
"id": 489026843,
"name": "CVE-2022-1388-checker",
"full_name": "jheeree\/CVE-2022-1388-checker",
"owner": {
"login": "jheeree",
"id": 19227591,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/19227591?v=4",
"html_url": "https:\/\/github.com\/jheeree"
},
"html_url": "https:\/\/github.com\/jheeree\/CVE-2022-1388-checker",
"description": "Simple script realizado en bash, para revisión de múltiples hosts para CVE-2022-1388 (F5)",
"fork": false,
"created_at": "2022-05-05T15:25:53Z",
2022-05-08 14:15:10 +02:00
"updated_at": "2022-05-08T08:58:52Z",
2022-05-06 02:15:09 +02:00
"pushed_at": "2022-05-05T22:49:40Z",
2022-05-08 14:15:10 +02:00
"stargazers_count": 16,
"watchers_count": 16,
"forks_count": 9,
2022-05-05 14:17:36 +02:00
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
2022-05-08 14:15:10 +02:00
"forks": 9,
"watchers": 16,
2022-05-06 14:15:38 +02:00
"score": 0
},
{
"id": 489240417,
"name": "Nuclei-Template-CVE-2022-1388-BIG-IP-iControl-REST-Exposed",
"full_name": "MrCl0wnLab\/Nuclei-Template-CVE-2022-1388-BIG-IP-iControl-REST-Exposed",
"owner": {
"login": "MrCl0wnLab",
"id": 17049332,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17049332?v=4",
"html_url": "https:\/\/github.com\/MrCl0wnLab"
},
"html_url": "https:\/\/github.com\/MrCl0wnLab\/Nuclei-Template-CVE-2022-1388-BIG-IP-iControl-REST-Exposed",
"description": "This vulnerability may allow an unauthenticated attacker with network access to the BIG-IP system through the management port and\/or self IP addresses to execute arbitrary system commands, create or delete files, or disable services. There is no data plane exposure; this is a control plane issue only.",
"fork": false,
"created_at": "2022-05-06T06:22:47Z",
2022-05-08 14:15:10 +02:00
"updated_at": "2022-05-08T11:09:03Z",
2022-05-06 20:16:29 +02:00
"pushed_at": "2022-05-06T15:33:14Z",
2022-05-08 14:15:10 +02:00
"stargazers_count": 10,
"watchers_count": 10,
2022-05-07 08:15:18 +02:00
"forks_count": 4,
2022-05-06 14:15:38 +02:00
"allow_forking": true,
"is_template": false,
"topics": [
"bigip",
"bigip-rest-api",
"cve-2022-1388",
"nuclei",
"nuclei-detection",
"nuclei-templates"
],
"visibility": "public",
2022-05-07 08:15:18 +02:00
"forks": 4,
2022-05-08 14:15:10 +02:00
"watchers": 10,
2022-05-07 20:15:01 +02:00
"score": 0
},
{
"id": 489669248,
"name": "westone-CVE-2022-1388-scanner",
"full_name": "Osyanina\/westone-CVE-2022-1388-scanner",
"owner": {
"login": "Osyanina",
"id": 78467376,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/78467376?v=4",
"html_url": "https:\/\/github.com\/Osyanina"
},
"html_url": "https:\/\/github.com\/Osyanina\/westone-CVE-2022-1388-scanner",
"description": "A vulnerability scanner that detects CVE-2021-21980 vulnerabilities.",
"fork": false,
"created_at": "2022-05-07T12:36:41Z",
"updated_at": "2022-05-07T12:37:01Z",
"pushed_at": "2022-05-07T12:41:34Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 489745068,
"name": "F5-BIG-IP-RCE-Check",
"full_name": "bytecaps\/F5-BIG-IP-RCE-Check",
"owner": {
"login": "bytecaps",
"id": 52679771,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/52679771?v=4",
"html_url": "https:\/\/github.com\/bytecaps"
},
"html_url": "https:\/\/github.com\/bytecaps\/F5-BIG-IP-RCE-Check",
"description": "CVE-2022-1388 F5 BIG-IP iControl Rest API exposed RCE Check",
"fork": false,
"created_at": "2022-05-07T17:54:08Z",
"updated_at": "2022-05-07T17:54:14Z",
2022-05-08 14:15:10 +02:00
"pushed_at": "2022-05-08T11:41:37Z",
2022-05-07 20:15:01 +02:00
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 489746944,
"name": "CVE-2022-1388-RCE",
"full_name": "TomArni680\/CVE-2022-1388-RCE",
"owner": {
"login": "TomArni680",
"id": 104999480,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/104999480?v=4",
"html_url": "https:\/\/github.com\/TomArni680"
},
"html_url": "https:\/\/github.com\/TomArni680\/CVE-2022-1388-RCE",
"description": "BIG-IP iCONTROL REST AUTH BYPASS RCE POC CVE-2022-1388",
"fork": false,
"created_at": "2022-05-07T18:02:55Z",
2022-05-08 14:15:10 +02:00
"updated_at": "2022-05-08T07:07:08Z",
2022-05-07 20:15:01 +02:00
"pushed_at": "2022-05-07T18:05:27Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
2022-05-05 14:17:36 +02:00
"score": 0
2022-05-08 14:15:10 +02:00
},
{
"id": 489899447,
"name": "CVE-2022-1388-RCE-checker",
"full_name": "blind-intruder\/CVE-2022-1388-RCE-checker",
"owner": {
"login": "blind-intruder",
"id": 41877347,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/41877347?v=4",
"html_url": "https:\/\/github.com\/blind-intruder"
},
"html_url": "https:\/\/github.com\/blind-intruder\/CVE-2022-1388-RCE-checker",
"description": null,
"fork": false,
"created_at": "2022-05-08T09:28:19Z",
"updated_at": "2022-05-08T09:28:49Z",
"pushed_at": "2022-05-08T09:29:32Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
2022-05-05 14:17:36 +02:00
}
]