2022-05-05 14:17:36 +02:00
[
{
"id" : 488929451 ,
"name" : "CVE-2022-1388" ,
"full_name" : "numanturle\/CVE-2022-1388" ,
"owner" : {
"login" : "numanturle" ,
"id" : 7007951 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/7007951?v=4" ,
"html_url" : "https:\/\/github.com\/numanturle"
} ,
"html_url" : "https:\/\/github.com\/numanturle\/CVE-2022-1388" ,
"description" : "K23605346: BIG-IP iControl REST vulnerability CVE-2022-1388" ,
"fork" : false ,
"created_at" : "2022-05-05T10:35:35Z" ,
2022-05-06 14:15:38 +02:00
"updated_at" : "2022-05-06T11:37:42Z" ,
2022-05-05 14:17:36 +02:00
"pushed_at" : "2022-05-05T10:44:36Z" ,
2022-05-06 14:15:38 +02:00
"stargazers_count" : 6 ,
"watchers_count" : 6 ,
"forks_count" : 5 ,
2022-05-05 20:15:37 +02:00
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
2022-05-06 14:15:38 +02:00
"forks" : 5 ,
"watchers" : 6 ,
2022-05-05 20:15:37 +02:00
"score" : 0
} ,
{
"id" : 489015664 ,
"name" : "CVE-2022-1388-POC" ,
"full_name" : "TomArni680\/CVE-2022-1388-POC" ,
"owner" : {
"login" : "TomArni680" ,
"id" : 104999480 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/104999480?v=4" ,
"html_url" : "https:\/\/github.com\/TomArni680"
} ,
"html_url" : "https:\/\/github.com\/TomArni680\/CVE-2022-1388-POC" ,
"description" : "BIG-IP iCONTROL REST AUTH BYPASS RCE POC CVE-2022-1388" ,
"fork" : false ,
"created_at" : "2022-05-05T14:55:45Z" ,
"updated_at" : "2022-05-05T15:30:40Z" ,
"pushed_at" : "2022-05-05T15:30:37Z" ,
2022-05-05 14:17:36 +02:00
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
2022-05-05 20:15:37 +02:00
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
} ,
{
"id" : 489026843 ,
"name" : "CVE-2022-1388-checker" ,
"full_name" : "jheeree\/CVE-2022-1388-checker" ,
"owner" : {
"login" : "jheeree" ,
"id" : 19227591 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/19227591?v=4" ,
"html_url" : "https:\/\/github.com\/jheeree"
} ,
"html_url" : "https:\/\/github.com\/jheeree\/CVE-2022-1388-checker" ,
"description" : "Simple script realizado en bash, para revisión de múltiples hosts para CVE-2022-1388 (F5)" ,
"fork" : false ,
"created_at" : "2022-05-05T15:25:53Z" ,
2022-05-06 14:15:38 +02:00
"updated_at" : "2022-05-06T09:15:33Z" ,
2022-05-06 02:15:09 +02:00
"pushed_at" : "2022-05-05T22:49:40Z" ,
2022-05-06 14:15:38 +02:00
"stargazers_count" : 10 ,
"watchers_count" : 10 ,
"forks_count" : 4 ,
2022-05-05 14:17:36 +02:00
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
2022-05-06 14:15:38 +02:00
"forks" : 4 ,
"watchers" : 10 ,
"score" : 0
} ,
{
"id" : 489240417 ,
"name" : "Nuclei-Template-CVE-2022-1388-BIG-IP-iControl-REST-Exposed" ,
"full_name" : "MrCl0wnLab\/Nuclei-Template-CVE-2022-1388-BIG-IP-iControl-REST-Exposed" ,
"owner" : {
"login" : "MrCl0wnLab" ,
"id" : 17049332 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/17049332?v=4" ,
"html_url" : "https:\/\/github.com\/MrCl0wnLab"
} ,
"html_url" : "https:\/\/github.com\/MrCl0wnLab\/Nuclei-Template-CVE-2022-1388-BIG-IP-iControl-REST-Exposed" ,
"description" : "This vulnerability may allow an unauthenticated attacker with network access to the BIG-IP system through the management port and\/or self IP addresses to execute arbitrary system commands, create or delete files, or disable services. There is no data plane exposure; this is a control plane issue only." ,
"fork" : false ,
"created_at" : "2022-05-06T06:22:47Z" ,
"updated_at" : "2022-05-06T09:10:39Z" ,
"pushed_at" : "2022-05-06T06:59:02Z" ,
"stargazers_count" : 6 ,
"watchers_count" : 6 ,
"forks_count" : 2 ,
"allow_forking" : true ,
"is_template" : false ,
"topics" : [
"bigip" ,
"bigip-rest-api" ,
"cve-2022-1388" ,
"nuclei" ,
"nuclei-detection" ,
"nuclei-templates"
] ,
"visibility" : "public" ,
"forks" : 2 ,
"watchers" : 6 ,
2022-05-05 14:17:36 +02:00
"score" : 0
}
]