PoC-in-GitHub/2022/CVE-2022-1388.json

117 lines
4.3 KiB
JSON
Raw Normal View History

2022-05-05 14:17:36 +02:00
[
{
"id": 488929451,
"name": "CVE-2022-1388",
"full_name": "numanturle\/CVE-2022-1388",
"owner": {
"login": "numanturle",
"id": 7007951,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7007951?v=4",
"html_url": "https:\/\/github.com\/numanturle"
},
"html_url": "https:\/\/github.com\/numanturle\/CVE-2022-1388",
"description": "K23605346: BIG-IP iControl REST vulnerability CVE-2022-1388",
"fork": false,
"created_at": "2022-05-05T10:35:35Z",
2022-05-06 14:15:38 +02:00
"updated_at": "2022-05-06T11:37:42Z",
2022-05-05 14:17:36 +02:00
"pushed_at": "2022-05-05T10:44:36Z",
2022-05-06 14:15:38 +02:00
"stargazers_count": 6,
"watchers_count": 6,
"forks_count": 5,
2022-05-05 20:15:37 +02:00
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
2022-05-06 14:15:38 +02:00
"forks": 5,
"watchers": 6,
2022-05-05 20:15:37 +02:00
"score": 0
},
{
"id": 489015664,
"name": "CVE-2022-1388-POC",
"full_name": "TomArni680\/CVE-2022-1388-POC",
"owner": {
"login": "TomArni680",
"id": 104999480,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/104999480?v=4",
"html_url": "https:\/\/github.com\/TomArni680"
},
"html_url": "https:\/\/github.com\/TomArni680\/CVE-2022-1388-POC",
"description": "BIG-IP iCONTROL REST AUTH BYPASS RCE POC CVE-2022-1388",
"fork": false,
"created_at": "2022-05-05T14:55:45Z",
2022-05-06 20:16:29 +02:00
"updated_at": "2022-05-06T17:21:12Z",
2022-05-05 20:15:37 +02:00
"pushed_at": "2022-05-05T15:30:37Z",
2022-05-05 14:17:36 +02:00
"stargazers_count": 0,
"watchers_count": 0,
2022-05-05 20:15:37 +02:00
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 489026843,
"name": "CVE-2022-1388-checker",
"full_name": "jheeree\/CVE-2022-1388-checker",
"owner": {
"login": "jheeree",
"id": 19227591,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/19227591?v=4",
"html_url": "https:\/\/github.com\/jheeree"
},
"html_url": "https:\/\/github.com\/jheeree\/CVE-2022-1388-checker",
"description": "Simple script realizado en bash, para revisión de múltiples hosts para CVE-2022-1388 (F5)",
"fork": false,
"created_at": "2022-05-05T15:25:53Z",
2022-05-07 02:15:11 +02:00
"updated_at": "2022-05-06T23:13:47Z",
2022-05-06 02:15:09 +02:00
"pushed_at": "2022-05-05T22:49:40Z",
2022-05-07 02:15:11 +02:00
"stargazers_count": 11,
"watchers_count": 11,
2022-05-06 20:16:29 +02:00
"forks_count": 5,
2022-05-05 14:17:36 +02:00
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
2022-05-06 20:16:29 +02:00
"forks": 5,
2022-05-07 02:15:11 +02:00
"watchers": 11,
2022-05-06 14:15:38 +02:00
"score": 0
},
{
"id": 489240417,
"name": "Nuclei-Template-CVE-2022-1388-BIG-IP-iControl-REST-Exposed",
"full_name": "MrCl0wnLab\/Nuclei-Template-CVE-2022-1388-BIG-IP-iControl-REST-Exposed",
"owner": {
"login": "MrCl0wnLab",
"id": 17049332,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17049332?v=4",
"html_url": "https:\/\/github.com\/MrCl0wnLab"
},
"html_url": "https:\/\/github.com\/MrCl0wnLab\/Nuclei-Template-CVE-2022-1388-BIG-IP-iControl-REST-Exposed",
"description": "This vulnerability may allow an unauthenticated attacker with network access to the BIG-IP system through the management port and\/or self IP addresses to execute arbitrary system commands, create or delete files, or disable services. There is no data plane exposure; this is a control plane issue only.",
"fork": false,
"created_at": "2022-05-06T06:22:47Z",
2022-05-06 20:16:29 +02:00
"updated_at": "2022-05-06T18:00:41Z",
"pushed_at": "2022-05-06T15:33:14Z",
"stargazers_count": 7,
"watchers_count": 7,
"forks_count": 3,
2022-05-06 14:15:38 +02:00
"allow_forking": true,
"is_template": false,
"topics": [
"bigip",
"bigip-rest-api",
"cve-2022-1388",
"nuclei",
"nuclei-detection",
"nuclei-templates"
],
"visibility": "public",
2022-05-06 20:16:29 +02:00
"forks": 3,
"watchers": 7,
2022-05-05 14:17:36 +02:00
"score": 0
}
]