[ { "id": 488929451, "name": "CVE-2022-1388", "full_name": "numanturle\/CVE-2022-1388", "owner": { "login": "numanturle", "id": 7007951, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7007951?v=4", "html_url": "https:\/\/github.com\/numanturle" }, "html_url": "https:\/\/github.com\/numanturle\/CVE-2022-1388", "description": "K23605346: BIG-IP iControl REST vulnerability CVE-2022-1388", "fork": false, "created_at": "2022-05-05T10:35:35Z", "updated_at": "2022-07-27T07:13:30Z", "pushed_at": "2022-05-09T21:09:45Z", "stargazers_count": 52, "watchers_count": 52, "forks_count": 13, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 13, "watchers": 52, "score": 0 }, { "id": 489026843, "name": "CVE-2022-1388-checker", "full_name": "jheeree\/CVE-2022-1388-checker", "owner": { "login": "jheeree", "id": 19227591, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/19227591?v=4", "html_url": "https:\/\/github.com\/jheeree" }, "html_url": "https:\/\/github.com\/jheeree\/CVE-2022-1388-checker", "description": "Simple script realizado en bash, para revisión de múltiples hosts para CVE-2022-1388 (F5)", "fork": false, "created_at": "2022-05-05T15:25:53Z", "updated_at": "2022-08-16T11:13:46Z", "pushed_at": "2022-05-05T22:49:40Z", "stargazers_count": 25, "watchers_count": 25, "forks_count": 12, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 12, "watchers": 25, "score": 0 }, { "id": 489745068, "name": "CVE-2022-1388-EXP", "full_name": "bytecaps\/CVE-2022-1388-EXP", "owner": { "login": "bytecaps", "id": 52679771, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/52679771?v=4", "html_url": "https:\/\/github.com\/bytecaps" }, "html_url": "https:\/\/github.com\/bytecaps\/CVE-2022-1388-EXP", "description": "CVE-2022-1388 F5 BIG-IP RCE 批量检测", "fork": false, "created_at": "2022-05-07T17:54:08Z", "updated_at": "2022-08-28T19:18:26Z", "pushed_at": "2022-05-09T11:15:27Z", "stargazers_count": 83, "watchers_count": 83, "forks_count": 23, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 23, "watchers": 83, "score": 0 }, { "id": 489899447, "name": "CVE-2022-1388-RCE-checker-and-POC-Exploit", "full_name": "blind-intruder\/CVE-2022-1388-RCE-checker-and-POC-Exploit", "owner": { "login": "blind-intruder", "id": 41877347, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/41877347?v=4", "html_url": "https:\/\/github.com\/blind-intruder" }, "html_url": "https:\/\/github.com\/blind-intruder\/CVE-2022-1388-RCE-checker-and-POC-Exploit", "description": null, "fork": false, "created_at": "2022-05-08T09:28:19Z", "updated_at": "2022-08-10T19:24:51Z", "pushed_at": "2022-05-12T11:46:56Z", "stargazers_count": 5, "watchers_count": 5, "forks_count": 3, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 3, "watchers": 5, "score": 0 }, { "id": 490120378, "name": "CVE-2022-1388", "full_name": "Hudi233\/CVE-2022-1388", "owner": { "login": "Hudi233", "id": 20939673, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20939673?v=4", "html_url": "https:\/\/github.com\/Hudi233" }, "html_url": "https:\/\/github.com\/Hudi233\/CVE-2022-1388", "description": null, "fork": false, "created_at": "2022-05-09T03:20:46Z", "updated_at": "2022-05-09T03:30:48Z", "pushed_at": "2022-05-09T03:35:31Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0 }, { "id": 490182003, "name": "CVE-2022-1388-Exploit-POC", "full_name": "sherlocksecurity\/CVE-2022-1388-Exploit-POC", "owner": { "login": "sherlocksecurity", "id": 52328067, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/52328067?v=4", "html_url": "https:\/\/github.com\/sherlocksecurity" }, "html_url": "https:\/\/github.com\/sherlocksecurity\/CVE-2022-1388-Exploit-POC", "description": "PoC for CVE-2022-1388_F5_BIG-IP", "fork": false, "created_at": "2022-05-09T07:39:55Z", "updated_at": "2022-08-28T15:49:21Z", "pushed_at": "2022-05-15T02:30:40Z", "stargazers_count": 59, "watchers_count": 59, "forks_count": 13, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 13, "watchers": 59, "score": 0 }, { "id": 490229104, "name": "CVE-2022-1388", "full_name": "yukar1z0e\/CVE-2022-1388", "owner": { "login": "yukar1z0e", "id": 44317939, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44317939?v=4", "html_url": "https:\/\/github.com\/yukar1z0e" }, "html_url": "https:\/\/github.com\/yukar1z0e\/CVE-2022-1388", "description": "batch scan CVE-2022-1388", "fork": false, "created_at": "2022-05-09T10:06:11Z", "updated_at": "2022-08-16T11:10:19Z", "pushed_at": "2022-05-09T10:07:45Z", "stargazers_count": 1, "watchers_count": 1, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 1, "score": 0 }, { "id": 490234251, "name": "CVE-2022-1388", "full_name": "0xf4n9x\/CVE-2022-1388", "owner": { "login": "0xf4n9x", "id": 40891670, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/40891670?v=4", "html_url": "https:\/\/github.com\/0xf4n9x" }, "html_url": "https:\/\/github.com\/0xf4n9x\/CVE-2022-1388", "description": "CVE-2022-1388 F5 BIG-IP iControl REST Auth Bypass RCE", "fork": false, "created_at": "2022-05-09T10:22:31Z", "updated_at": "2022-08-17T07:35:26Z", "pushed_at": "2022-06-28T18:14:40Z", "stargazers_count": 74, "watchers_count": 74, "forks_count": 30, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 30, "watchers": 74, "score": 0 }, { "id": 490237968, "name": "CVE-2022-1388_PoC", "full_name": "alt3kx\/CVE-2022-1388_PoC", "owner": { "login": "alt3kx", "id": 3140111, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3140111?v=4", "html_url": "https:\/\/github.com\/alt3kx" }, "html_url": "https:\/\/github.com\/alt3kx\/CVE-2022-1388_PoC", "description": "F5 BIG-IP RCE exploitation (CVE-2022-1388)", "fork": false, "created_at": "2022-05-09T10:34:38Z", "updated_at": "2022-08-29T16:57:28Z", "pushed_at": "2022-05-16T12:40:51Z", "stargazers_count": 70, "watchers_count": 70, "forks_count": 13, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 13, "watchers": 70, "score": 0 }, { "id": 490241404, "name": "F5-Big-IP-CVE-2022-1388", "full_name": "Vulnmachines\/F5-Big-IP-CVE-2022-1388", "owner": { "login": "Vulnmachines", "id": 79006904, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/79006904?v=4", "html_url": "https:\/\/github.com\/Vulnmachines" }, "html_url": "https:\/\/github.com\/Vulnmachines\/F5-Big-IP-CVE-2022-1388", "description": "CVE-2022-1388 F5 Big IP unauth remote code execution", "fork": false, "created_at": "2022-05-09T10:46:19Z", "updated_at": "2022-08-03T17:35:43Z", "pushed_at": "2022-07-26T05:18:58Z", "stargazers_count": 6, "watchers_count": 6, "forks_count": 4, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 4, "watchers": 6, "score": 0 }, { "id": 490254474, "name": "F5-CVE-2022-1388-Exploit", "full_name": "ZephrFish\/F5-CVE-2022-1388-Exploit", "owner": { "login": "ZephrFish", "id": 5783068, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5783068?v=4", "html_url": "https:\/\/github.com\/ZephrFish" }, "html_url": "https:\/\/github.com\/ZephrFish\/F5-CVE-2022-1388-Exploit", "description": "Exploit and Check Script for CVE 2022-1388", "fork": false, "created_at": "2022-05-09T11:30:09Z", "updated_at": "2022-08-03T17:26:33Z", "pushed_at": "2022-05-26T23:51:01Z", "stargazers_count": 47, "watchers_count": 47, "forks_count": 26, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 26, "watchers": 47, "score": 0 }, { "id": 490259731, "name": "CVE-2022-1388", "full_name": "horizon3ai\/CVE-2022-1388", "owner": { "login": "horizon3ai", "id": 79593994, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/79593994?v=4", "html_url": "https:\/\/github.com\/horizon3ai" }, "html_url": "https:\/\/github.com\/horizon3ai\/CVE-2022-1388", "description": "POC for CVE-2022-1388", "fork": false, "created_at": "2022-05-09T11:46:45Z", "updated_at": "2022-08-29T14:20:43Z", "pushed_at": "2022-05-09T20:52:07Z", "stargazers_count": 217, "watchers_count": 217, "forks_count": 36, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 36, "watchers": 217, "score": 0 }, { "id": 490307613, "name": "CVE-2022-1388", "full_name": "Al1ex\/CVE-2022-1388", "owner": { "login": "Al1ex", "id": 38161463, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38161463?v=4", "html_url": "https:\/\/github.com\/Al1ex" }, "html_url": "https:\/\/github.com\/Al1ex\/CVE-2022-1388", "description": "CVE-2022-1388 F5 BIG-IP iControl REST RCE", "fork": false, "created_at": "2022-05-09T14:01:38Z", "updated_at": "2022-08-16T11:10:14Z", "pushed_at": "2022-05-09T14:20:40Z", "stargazers_count": 22, "watchers_count": 22, "forks_count": 9, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "cve-2022-1388", "f5-big-ip-icontrol-rest-rce" ], "visibility": "public", "forks": 9, "watchers": 22, "score": 0 }, { "id": 490307975, "name": "CVE-2022-1388", "full_name": "Henry4E36\/CVE-2022-1388", "owner": { "login": "Henry4E36", "id": 41940481, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/41940481?v=4", "html_url": "https:\/\/github.com\/Henry4E36" }, "html_url": "https:\/\/github.com\/Henry4E36\/CVE-2022-1388", "description": "F5 BIG-IP iControl REST身份验证绕过漏洞", "fork": false, "created_at": "2022-05-09T14:02:34Z", "updated_at": "2022-08-22T02:05:20Z", "pushed_at": "2022-08-22T01:20:14Z", "stargazers_count": 7, "watchers_count": 7, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 7, "score": 0 }, { "id": 490321219, "name": "CVE-2022-1388", "full_name": "savior-only\/CVE-2022-1388", "owner": { "login": "savior-only", "id": 69495405, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/69495405?v=4", "html_url": "https:\/\/github.com\/savior-only" }, "html_url": "https:\/\/github.com\/savior-only\/CVE-2022-1388", "description": "CVE-2022-1388 F5 BIG-IP iControl REST身份验证绕过漏洞", "fork": false, "created_at": "2022-05-09T14:37:04Z", "updated_at": "2022-05-09T14:39:16Z", "pushed_at": "2022-05-13T18:18:48Z", "stargazers_count": 2, "watchers_count": 2, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 2, "score": 0 }, { "id": 490339060, "name": "CVE-2022-1388", "full_name": "saucer-man\/CVE-2022-1388", "owner": { "login": "saucer-man", "id": 32133080, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/32133080?v=4", "html_url": "https:\/\/github.com\/saucer-man" }, "html_url": "https:\/\/github.com\/saucer-man\/CVE-2022-1388", "description": "CVE-2022-1388", "fork": false, "created_at": "2022-05-09T15:24:27Z", "updated_at": "2022-07-01T17:11:51Z", "pushed_at": "2022-05-09T16:14:49Z", "stargazers_count": 1, "watchers_count": 1, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 1, "score": 0 }, { "id": 490345813, "name": "CVE-2022-1388", "full_name": "superzerosec\/CVE-2022-1388", "owner": { "login": "superzerosec", "id": 57648217, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57648217?v=4", "html_url": "https:\/\/github.com\/superzerosec" }, "html_url": "https:\/\/github.com\/superzerosec\/CVE-2022-1388", "description": "CVE-2022-1388 POC exploit", "fork": false, "created_at": "2022-05-09T15:42:55Z", "updated_at": "2022-08-23T19:50:16Z", "pushed_at": "2022-05-10T04:53:23Z", "stargazers_count": 2, "watchers_count": 2, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 2, "score": 0 }, { "id": 490383212, "name": "CVE-2022-1388-RCE-checker", "full_name": "trhacknon\/CVE-2022-1388-RCE-checker", "owner": { "login": "trhacknon", "id": 98242014, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/98242014?v=4", "html_url": "https:\/\/github.com\/trhacknon" }, "html_url": "https:\/\/github.com\/trhacknon\/CVE-2022-1388-RCE-checker", "description": null, "fork": false, "created_at": "2022-05-09T17:34:28Z", "updated_at": "2022-05-09T17:34:39Z", "pushed_at": "2022-05-09T17:34:36Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 0, "score": 0 }, { "id": 490521216, "name": "Exploit-F5-CVE-2022-1388", "full_name": "Stonzyy\/Exploit-F5-CVE-2022-1388", "owner": { "login": "Stonzyy", "id": 33039121, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33039121?v=4", "html_url": "https:\/\/github.com\/Stonzyy" }, "html_url": "https:\/\/github.com\/Stonzyy\/Exploit-F5-CVE-2022-1388", "description": "PoC For F5 BIG-IP - bash script Exploit one Liner", "fork": false, "created_at": "2022-05-10T02:57:31Z", "updated_at": "2022-07-19T17:42:08Z", "pushed_at": "2022-05-10T08:38:58Z", "stargazers_count": 8, "watchers_count": 8, "forks_count": 3, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 3, "watchers": 8, "score": 0 }, { "id": 490537604, "name": "Nuclei-Template-Exploit-F5-BIG-IP-iControl-REST-Auth-Bypass-RCE-Command-Parameter", "full_name": "MrCl0wnLab\/Nuclei-Template-Exploit-F5-BIG-IP-iControl-REST-Auth-Bypass-RCE-Command-Parameter", "owner": { "login": "MrCl0wnLab", "id": 17049332, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17049332?v=4", "html_url": "https:\/\/github.com\/MrCl0wnLab" }, "html_url": "https:\/\/github.com\/MrCl0wnLab\/Nuclei-Template-Exploit-F5-BIG-IP-iControl-REST-Auth-Bypass-RCE-Command-Parameter", "description": "CVE-2022-1388 is an authentication bypass vulnerability in the REST component of BIG-IP’s iControl API that was assigned a CVSSv3 score of 9.8. The iControl REST API is used for the management and configuration of BIG-IP devices. CVE-2022-1388 could be exploited by an unauthenticated attacker with network access to the management port or self IP addresses of devices that use BIG-IP. Exploitation would allow the attacker to execute arbitrary system commands, create and delete files and disable services.", "fork": false, "created_at": "2022-05-10T04:10:46Z", "updated_at": "2022-05-12T17:04:20Z", "pushed_at": "2022-05-12T17:06:29Z", "stargazers_count": 3, "watchers_count": 3, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "bigip", "bigip-rest-api", "cve-2022-1388", "exploit", "f5-bigip", "nuclei", "nuclei-templates" ], "visibility": "public", "forks": 0, "watchers": 3, "score": 0 }, { "id": 490544324, "name": "F5-BigIP-CVE-2022-1388", "full_name": "qusaialhaddad\/F5-BigIP-CVE-2022-1388", "owner": { "login": "qusaialhaddad", "id": 9527146, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/9527146?v=4", "html_url": "https:\/\/github.com\/qusaialhaddad" }, "html_url": "https:\/\/github.com\/qusaialhaddad\/F5-BigIP-CVE-2022-1388", "description": "Reverse Shell for CVE-2022-1388", "fork": false, "created_at": "2022-05-10T04:44:05Z", "updated_at": "2022-08-03T17:34:51Z", "pushed_at": "2022-05-10T05:00:43Z", "stargazers_count": 9, "watchers_count": 9, "forks_count": 3, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 3, "watchers": 9, "score": 0 }, { "id": 490545813, "name": "CVE-2022-1388", "full_name": "chesterblue\/CVE-2022-1388", "owner": { "login": "chesterblue", "id": 38368702, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38368702?v=4", "html_url": "https:\/\/github.com\/chesterblue" }, "html_url": "https:\/\/github.com\/chesterblue\/CVE-2022-1388", "description": "POC of CVE-2022-1388", "fork": false, "created_at": "2022-05-10T04:51:06Z", "updated_at": "2022-05-10T05:01:29Z", "pushed_at": "2022-05-10T04:58:30Z", "stargazers_count": 1, "watchers_count": 1, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 1, "score": 0 }, { "id": 490554565, "name": "F5-BIG-IP-RCE-CVE-2022-1388", "full_name": "Angus-Team\/F5-BIG-IP-RCE-CVE-2022-1388", "owner": { "login": "Angus-Team", "id": 103045627, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/103045627?v=4", "html_url": "https:\/\/github.com\/Angus-Team" }, "html_url": "https:\/\/github.com\/Angus-Team\/F5-BIG-IP-RCE-CVE-2022-1388", "description": null, "fork": false, "created_at": "2022-05-10T05:30:11Z", "updated_at": "2022-06-16T05:09:43Z", "pushed_at": "2022-05-10T05:35:23Z", "stargazers_count": 1, "watchers_count": 1, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 1, "score": 0 }, { "id": 490601730, "name": "CVE-2022-1388-EXP", "full_name": "LinJacck\/CVE-2022-1388-EXP", "owner": { "login": "LinJacck", "id": 57176639, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57176639?v=4", "html_url": "https:\/\/github.com\/LinJacck" }, "html_url": "https:\/\/github.com\/LinJacck\/CVE-2022-1388-EXP", "description": "CVE-2022-1388-EXP可批量实现攻击", "fork": false, "created_at": "2022-05-10T08:09:30Z", "updated_at": "2022-08-15T15:42:24Z", "pushed_at": "2022-05-10T08:14:49Z", "stargazers_count": 1, "watchers_count": 1, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 1, "score": 0 }, { "id": 490606277, "name": "cve-2022-1388-1veresk", "full_name": "iveresk\/cve-2022-1388-1veresk", "owner": { "login": "iveresk", "id": 28754633, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/28754633?v=4", "html_url": "https:\/\/github.com\/iveresk" }, "html_url": "https:\/\/github.com\/iveresk\/cve-2022-1388-1veresk", "description": "Simple shell script for the exploit", "fork": false, "created_at": "2022-05-10T08:22:46Z", "updated_at": "2022-05-10T08:31:03Z", "pushed_at": "2022-05-24T12:39:02Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0 }, { "id": 490613608, "name": "CVE-2022-1388", "full_name": "shamo0\/CVE-2022-1388", "owner": { "login": "shamo0", "id": 48299520, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/48299520?v=4", "html_url": "https:\/\/github.com\/shamo0" }, "html_url": "https:\/\/github.com\/shamo0\/CVE-2022-1388", "description": "BIG-IP iControl REST vulnerability CVE-2022-1388 PoC", "fork": false, "created_at": "2022-05-10T08:44:24Z", "updated_at": "2022-05-10T10:15:46Z", "pushed_at": "2022-05-10T09:09:23Z", "stargazers_count": 1, "watchers_count": 1, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "1388", "2022", "bash", "bigip", "cve", "cve-2022-1388", "exploit", "f5", "icontrol", "python", "rest", "script", "shell", "vulnerabilit" ], "visibility": "public", "forks": 0, "watchers": 1, "score": 0 }, { "id": 490623250, "name": "CVE-2022-1388-F5-BIG-IP", "full_name": "vesperp\/CVE-2022-1388-F5-BIG-IP", "owner": { "login": "vesperp", "id": 28191544, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/28191544?v=4", "html_url": "https:\/\/github.com\/vesperp" }, "html_url": "https:\/\/github.com\/vesperp\/CVE-2022-1388-F5-BIG-IP", "description": null, "fork": false, "created_at": "2022-05-10T09:12:22Z", "updated_at": "2022-05-18T08:46:17Z", "pushed_at": "2022-05-18T08:32:27Z", "stargazers_count": 1, "watchers_count": 1, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 1, "score": 0 }, { "id": 490752282, "name": "CVE-2022-1388-Exploit", "full_name": "thatonesecguy\/CVE-2022-1388-Exploit", "owner": { "login": "thatonesecguy", "id": 34110198, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/34110198?v=4", "html_url": "https:\/\/github.com\/thatonesecguy" }, "html_url": "https:\/\/github.com\/thatonesecguy\/CVE-2022-1388-Exploit", "description": "Test and Exploit Scripts for CVE 2022-1388 (F5 Big-IP)", "fork": false, "created_at": "2022-05-10T15:16:12Z", "updated_at": "2022-06-14T13:15:36Z", "pushed_at": "2022-05-10T15:28:13Z", "stargazers_count": 2, "watchers_count": 2, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 2, "score": 0 }, { "id": 490758825, "name": "CVE2022-1388_TestAPI", "full_name": "bandit92\/CVE2022-1388_TestAPI", "owner": { "login": "bandit92", "id": 11216382, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11216382?v=4", "html_url": "https:\/\/github.com\/bandit92" }, "html_url": "https:\/\/github.com\/bandit92\/CVE2022-1388_TestAPI", "description": "A Test API for testing the POC against CVE-2022-1388", "fork": false, "created_at": "2022-05-10T15:34:14Z", "updated_at": "2022-05-26T21:22:13Z", "pushed_at": "2022-05-10T15:37:42Z", "stargazers_count": 4, "watchers_count": 4, "forks_count": 2, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 2, "watchers": 4, "score": 0 }, { "id": 490762622, "name": "CVE-2022-1388-PocExp", "full_name": "aodsec\/CVE-2022-1388-PocExp", "owner": { "login": "aodsec", "id": 96908273, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/96908273?v=4", "html_url": "https:\/\/github.com\/aodsec" }, "html_url": "https:\/\/github.com\/aodsec\/CVE-2022-1388-PocExp", "description": "CVE-2022-1388-PocExp,新增了多线程,F5 BIG-IP RCE exploitation", "fork": false, "created_at": "2022-05-10T15:44:50Z", "updated_at": "2022-06-11T08:36:43Z", "pushed_at": "2022-05-16T14:02:29Z", "stargazers_count": 5, "watchers_count": 5, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 5, "score": 0 }, { "id": 490856318, "name": "CVE-2022-1388", "full_name": "0xAgun\/CVE-2022-1388", "owner": { "login": "0xAgun", "id": 78228966, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/78228966?v=4", "html_url": "https:\/\/github.com\/0xAgun" }, "html_url": "https:\/\/github.com\/0xAgun\/CVE-2022-1388", "description": null, "fork": false, "created_at": "2022-05-10T20:49:12Z", "updated_at": "2022-05-10T20:50:02Z", "pushed_at": "2022-05-14T15:01:16Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0 }, { "id": 491215019, "name": "CVE-2022-1388-Scanner", "full_name": "AmirHoseinTangsiriNET\/CVE-2022-1388-Scanner", "owner": { "login": "AmirHoseinTangsiriNET", "id": 64230943, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/64230943?v=4", "html_url": "https:\/\/github.com\/AmirHoseinTangsiriNET" }, "html_url": "https:\/\/github.com\/AmirHoseinTangsiriNET\/CVE-2022-1388-Scanner", "description": null, "fork": false, "created_at": "2022-05-11T17:43:44Z", "updated_at": "2022-07-18T17:57:19Z", "pushed_at": "2022-05-27T11:27:32Z", "stargazers_count": 5, "watchers_count": 5, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 5, "score": 0 }, { "id": 491248239, "name": "CVE-2022-1388", "full_name": "EvilLizard666\/CVE-2022-1388", "owner": { "login": "EvilLizard666", "id": 46286364, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/46286364?v=4", "html_url": "https:\/\/github.com\/EvilLizard666" }, "html_url": "https:\/\/github.com\/EvilLizard666\/CVE-2022-1388", "description": "CVE-2022-1388 Scanner", "fork": false, "created_at": "2022-05-11T19:33:37Z", "updated_at": "2022-07-04T19:06:44Z", "pushed_at": "2022-07-06T00:56:28Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0 }, { "id": 491258779, "name": "CVE-2022-1388", "full_name": "mr-vill4in\/CVE-2022-1388", "owner": { "login": "mr-vill4in", "id": 51061936, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51061936?v=4", "html_url": "https:\/\/github.com\/mr-vill4in" }, "html_url": "https:\/\/github.com\/mr-vill4in\/CVE-2022-1388", "description": "CVE-2022-1388", "fork": false, "created_at": "2022-05-11T20:13:09Z", "updated_at": "2022-05-15T06:59:51Z", "pushed_at": "2022-05-11T20:15:49Z", "stargazers_count": 1, "watchers_count": 1, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 1, "score": 0 }, { "id": 491262541, "name": "CVE-2022-1388", "full_name": "omnigodz\/CVE-2022-1388", "owner": { "login": "omnigodz", "id": 20488509, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20488509?v=4", "html_url": "https:\/\/github.com\/omnigodz" }, "html_url": "https:\/\/github.com\/omnigodz\/CVE-2022-1388", "description": "This repository consists of the python exploit for CVE-2022-1388 (F5's BIG-IP Authentication Bypass to RCE) ", "fork": false, "created_at": "2022-05-11T20:27:36Z", "updated_at": "2022-05-11T20:27:59Z", "pushed_at": "2022-06-08T13:57:39Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0 }, { "id": 491283164, "name": "CVE-2022-1388", "full_name": "pauloink\/CVE-2022-1388", "owner": { "login": "pauloink", "id": 64289774, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/64289774?v=4", "html_url": "https:\/\/github.com\/pauloink" }, "html_url": "https:\/\/github.com\/pauloink\/CVE-2022-1388", "description": null, "fork": false, "created_at": "2022-05-11T21:55:43Z", "updated_at": "2022-05-11T22:00:15Z", "pushed_at": "2022-05-11T22:00:12Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 0, "score": 0 }, { "id": 491500644, "name": "CVE-2022-1388", "full_name": "SecTheBit\/CVE-2022-1388", "owner": { "login": "SecTheBit", "id": 46895441, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/46895441?v=4", "html_url": "https:\/\/github.com\/SecTheBit" }, "html_url": "https:\/\/github.com\/SecTheBit\/CVE-2022-1388", "description": "Nuclei Template for CVE-2022-1388", "fork": false, "created_at": "2022-05-12T12:17:11Z", "updated_at": "2022-05-13T06:43:45Z", "pushed_at": "2022-05-12T12:32:38Z", "stargazers_count": 1, "watchers_count": 1, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 1, "score": 0 }, { "id": 491598048, "name": "CVE-2022-1388", "full_name": "Zeyad-Azima\/CVE-2022-1388", "owner": { "login": "Zeyad-Azima", "id": 62406753, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/62406753?v=4", "html_url": "https:\/\/github.com\/Zeyad-Azima" }, "html_url": "https:\/\/github.com\/Zeyad-Azima\/CVE-2022-1388", "description": "F5 BIG-IP iControl REST vulnerability RCE exploit with Java including a testing LAB", "fork": false, "created_at": "2022-05-12T16:54:52Z", "updated_at": "2022-06-17T02:58:31Z", "pushed_at": "2022-06-07T02:52:17Z", "stargazers_count": 9, "watchers_count": 9, "forks_count": 4, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "cve", "cve-2022-1388", "exploit", "f5", "f5-bigip", "icontrol", "rest-api" ], "visibility": "public", "forks": 4, "watchers": 9, "score": 0 }, { "id": 491851727, "name": "CVE-2022-1388", "full_name": "justakazh\/CVE-2022-1388", "owner": { "login": "justakazh", "id": 36891477, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/36891477?v=4", "html_url": "https:\/\/github.com\/justakazh" }, "html_url": "https:\/\/github.com\/justakazh\/CVE-2022-1388", "description": "Tool for CVE-2022-1388 ", "fork": false, "created_at": "2022-05-13T10:18:29Z", "updated_at": "2022-07-02T06:36:37Z", "pushed_at": "2022-05-13T10:22:08Z", "stargazers_count": 13, "watchers_count": 13, "forks_count": 3, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 3, "watchers": 13, "score": 0 }, { "id": 492382276, "name": "CVE-2022-1388-POC", "full_name": "PsychoSec2\/CVE-2022-1388-POC", "owner": { "login": "PsychoSec2", "id": 102695468, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102695468?v=4", "html_url": "https:\/\/github.com\/PsychoSec2" }, "html_url": "https:\/\/github.com\/PsychoSec2\/CVE-2022-1388-POC", "description": "An Improved Proof of Concept for CVE-2022-1388 w\/ an Interactive Shell", "fork": false, "created_at": "2022-05-15T03:58:21Z", "updated_at": "2022-08-24T09:57:21Z", "pushed_at": "2022-05-15T16:34:54Z", "stargazers_count": 9, "watchers_count": 9, "forks_count": 2, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 2, "watchers": 9, "score": 0 }, { "id": 492435532, "name": "cve-2022-1388-iveresk-command-shell", "full_name": "iveresk\/cve-2022-1388-iveresk-command-shell", "owner": { "login": "iveresk", "id": 28754633, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/28754633?v=4", "html_url": "https:\/\/github.com\/iveresk" }, "html_url": "https:\/\/github.com\/iveresk\/cve-2022-1388-iveresk-command-shell", "description": "Improved POC for CVE-2022-1388 that affects multiple F5 products.", "fork": false, "created_at": "2022-05-15T08:58:22Z", "updated_at": "2022-05-18T05:53:50Z", "pushed_at": "2022-05-24T12:39:26Z", "stargazers_count": 1, "watchers_count": 1, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 1, "score": 0 }, { "id": 492651669, "name": "CVE-2022-1388", "full_name": "Wrin9\/CVE-2022-1388", "owner": { "login": "Wrin9", "id": 54984589, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/54984589?v=4", "html_url": "https:\/\/github.com\/Wrin9" }, "html_url": "https:\/\/github.com\/Wrin9\/CVE-2022-1388", "description": null, "fork": false, "created_at": "2022-05-16T01:49:44Z", "updated_at": "2022-06-06T08:02:31Z", "pushed_at": "2022-05-16T01:52:19Z", "stargazers_count": 1, "watchers_count": 1, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 1, "score": 0 }, { "id": 493080053, "name": "F5-BIG-IP-exploit", "full_name": "getdrive\/F5-BIG-IP-exploit", "owner": { "login": "getdrive", "id": 20697688, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20697688?v=4", "html_url": "https:\/\/github.com\/getdrive" }, "html_url": "https:\/\/github.com\/getdrive\/F5-BIG-IP-exploit", "description": "CVE-2022-1388", "fork": false, "created_at": "2022-05-17T03:23:39Z", "updated_at": "2022-07-02T18:51:04Z", "pushed_at": "2022-07-02T20:08:48Z", "stargazers_count": 1, "watchers_count": 1, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "cve", "exploit", "rce" ], "visibility": "public", "forks": 1, "watchers": 1, "score": 0 }, { "id": 493209789, "name": "CVE-2022-1388-rs", "full_name": "aancw\/CVE-2022-1388-rs", "owner": { "login": "aancw", "id": 6284204, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6284204?v=4", "html_url": "https:\/\/github.com\/aancw" }, "html_url": "https:\/\/github.com\/aancw\/CVE-2022-1388-rs", "description": "CVE-2022-1388 F5 BIG-IP iControl REST Auth Bypass RCE written in Rust", "fork": false, "created_at": "2022-05-17T10:51:39Z", "updated_at": "2022-07-04T19:12:27Z", "pushed_at": "2022-06-01T09:09:07Z", "stargazers_count": 2, "watchers_count": 2, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 2, "score": 0 }, { "id": 495067625, "name": "CVE-2022-1388", "full_name": "XmasSnowISBACK\/CVE-2022-1388", "owner": { "login": "XmasSnowISBACK", "id": 105931778, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/105931778?v=4", "html_url": "https:\/\/github.com\/XmasSnowISBACK" }, "html_url": "https:\/\/github.com\/XmasSnowISBACK\/CVE-2022-1388", "description": "CVE-2022-1388 F5 BIG-IP iControl REST Auth Bypass RCE written in Rust ", "fork": false, "created_at": "2022-05-22T13:27:33Z", "updated_at": "2022-05-26T19:00:44Z", "pushed_at": "2022-05-22T13:46:18Z", "stargazers_count": 3, "watchers_count": 3, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 3, "score": 0 }, { "id": 497313238, "name": "CVE-2022-1388", "full_name": "trhacknon\/CVE-2022-1388", "owner": { "login": "trhacknon", "id": 98242014, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/98242014?v=4", "html_url": "https:\/\/github.com\/trhacknon" }, "html_url": "https:\/\/github.com\/trhacknon\/CVE-2022-1388", "description": null, "fork": false, "created_at": "2022-05-28T12:35:59Z", "updated_at": "2022-05-28T12:36:10Z", "pushed_at": "2022-05-28T12:36:07Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 0, "score": 0 }, { "id": 497314363, "name": "F5-CVE-2022-1388-Exploit", "full_name": "trhacknon\/F5-CVE-2022-1388-Exploit", "owner": { "login": "trhacknon", "id": 98242014, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/98242014?v=4", "html_url": "https:\/\/github.com\/trhacknon" }, "html_url": "https:\/\/github.com\/trhacknon\/F5-CVE-2022-1388-Exploit", "description": null, "fork": false, "created_at": "2022-05-28T12:40:56Z", "updated_at": "2022-05-28T12:41:07Z", "pushed_at": "2022-05-28T12:41:04Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 0, "score": 0 }, { "id": 497314878, "name": "Exploit-F5-CVE-2022-1388", "full_name": "trhacknon\/Exploit-F5-CVE-2022-1388", "owner": { "login": "trhacknon", "id": 98242014, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/98242014?v=4", "html_url": "https:\/\/github.com\/trhacknon" }, "html_url": "https:\/\/github.com\/trhacknon\/Exploit-F5-CVE-2022-1388", "description": null, "fork": false, "created_at": "2022-05-28T12:43:18Z", "updated_at": "2022-05-28T12:43:29Z", "pushed_at": "2022-05-28T12:43:26Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 0, "score": 0 }, { "id": 497315561, "name": "CVE-2022-1388-PocExp", "full_name": "trhacknon\/CVE-2022-1388-PocExp", "owner": { "login": "trhacknon", "id": 98242014, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/98242014?v=4", "html_url": "https:\/\/github.com\/trhacknon" }, "html_url": "https:\/\/github.com\/trhacknon\/CVE-2022-1388-PocExp", "description": null, "fork": false, "created_at": "2022-05-28T12:46:08Z", "updated_at": "2022-05-28T12:46:19Z", "pushed_at": "2022-05-28T12:46:16Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 0, "score": 0 }, { "id": 497326298, "name": "F5-BIG-IP-POC", "full_name": "west9b\/F5-BIG-IP-POC", "owner": { "login": "west9b", "id": 103512651, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/103512651?v=4", "html_url": "https:\/\/github.com\/west9b" }, "html_url": "https:\/\/github.com\/west9b\/F5-BIG-IP-POC", "description": "CVE-2020-5902 CVE-2021-22986 CVE-2022-1388 POC集合", "fork": false, "created_at": "2022-05-28T13:30:22Z", "updated_at": "2022-08-15T14:23:07Z", "pushed_at": "2022-07-30T00:16:29Z", "stargazers_count": 10, "watchers_count": 10, "forks_count": 2, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 2, "watchers": 10, "score": 0 }, { "id": 505264102, "name": "CVE-2022-1388", "full_name": "Chocapikk\/CVE-2022-1388", "owner": { "login": "Chocapikk", "id": 88535377, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88535377?v=4", "html_url": "https:\/\/github.com\/Chocapikk" }, "html_url": "https:\/\/github.com\/Chocapikk\/CVE-2022-1388", "description": "CVE-2022-1388 | F5 - Big IP Pre Auth RCE via '\/mgmt\/tm\/util\/bash' endpoint", "fork": false, "created_at": "2022-06-20T01:58:40Z", "updated_at": "2022-06-20T05:14:08Z", "pushed_at": "2022-06-20T02:00:06Z", "stargazers_count": 1, "watchers_count": 1, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 1, "score": 0 }, { "id": 506835397, "name": "Mass-CVE-2022-1388", "full_name": "electr0lulz\/Mass-CVE-2022-1388", "owner": { "login": "electr0lulz", "id": 106660834, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/106660834?v=4", "html_url": "https:\/\/github.com\/electr0lulz" }, "html_url": "https:\/\/github.com\/electr0lulz\/Mass-CVE-2022-1388", "description": "Mass-Exploit-CVE-2022-1388", "fork": false, "created_at": "2022-06-24T00:58:37Z", "updated_at": "2022-07-12T08:48:37Z", "pushed_at": "2022-06-24T01:30:40Z", "stargazers_count": 3, "watchers_count": 3, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "1388", "bash", "big-ip", "cve", "cve-2022-1388", "f5", "f5-bigip", "f5networks", "python", "shodan" ], "visibility": "public", "forks": 0, "watchers": 3, "score": 0 }, { "id": 509548569, "name": "CVE-2022-1388_refresh", "full_name": "Luchoane\/CVE-2022-1388_refresh", "owner": { "login": "Luchoane", "id": 40374879, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/40374879?v=4", "html_url": "https:\/\/github.com\/Luchoane" }, "html_url": "https:\/\/github.com\/Luchoane\/CVE-2022-1388_refresh", "description": "PoC for exploiting CVE-2022-1388 on BIG IP F5", "fork": false, "created_at": "2022-07-01T18:08:50Z", "updated_at": "2022-07-07T19:22:09Z", "pushed_at": "2022-07-01T20:04:27Z", "stargazers_count": 1, "watchers_count": 1, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 1, "score": 0 }, { "id": 510239425, "name": "CVE-2022-1388", "full_name": "jbharucha05\/CVE-2022-1388", "owner": { "login": "jbharucha05", "id": 13020621, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/13020621?v=4", "html_url": "https:\/\/github.com\/jbharucha05" }, "html_url": "https:\/\/github.com\/jbharucha05\/CVE-2022-1388", "description": "CVE-2022-1388, bypassing iControl REST authentication", "fork": false, "created_at": "2022-07-04T06:31:56Z", "updated_at": "2022-07-04T07:08:22Z", "pushed_at": "2022-07-04T10:37:39Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "cve-2022-1388", "f5-big-ip-icontrol-rest-rce", "f5-bigip" ], "visibility": "public", "forks": 0, "watchers": 0, "score": 0 } ]