mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-16 12:52:22 +01:00
1528 lines
No EOL
52 KiB
JSON
1528 lines
No EOL
52 KiB
JSON
[
|
||
{
|
||
"id": 488929451,
|
||
"name": "CVE-2022-1388",
|
||
"full_name": "numanturle\/CVE-2022-1388",
|
||
"owner": {
|
||
"login": "numanturle",
|
||
"id": 7007951,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7007951?v=4",
|
||
"html_url": "https:\/\/github.com\/numanturle"
|
||
},
|
||
"html_url": "https:\/\/github.com\/numanturle\/CVE-2022-1388",
|
||
"description": "K23605346: BIG-IP iControl REST vulnerability CVE-2022-1388",
|
||
"fork": false,
|
||
"created_at": "2022-05-05T10:35:35Z",
|
||
"updated_at": "2022-05-11T13:51:57Z",
|
||
"pushed_at": "2022-05-09T21:09:45Z",
|
||
"stargazers_count": 52,
|
||
"watchers_count": 52,
|
||
"forks_count": 13,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 13,
|
||
"watchers": 52,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 489026843,
|
||
"name": "CVE-2022-1388-checker",
|
||
"full_name": "jheeree\/CVE-2022-1388-checker",
|
||
"owner": {
|
||
"login": "jheeree",
|
||
"id": 19227591,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/19227591?v=4",
|
||
"html_url": "https:\/\/github.com\/jheeree"
|
||
},
|
||
"html_url": "https:\/\/github.com\/jheeree\/CVE-2022-1388-checker",
|
||
"description": "Simple script realizado en bash, para revisión de múltiples hosts para CVE-2022-1388 (F5)",
|
||
"fork": false,
|
||
"created_at": "2022-05-05T15:25:53Z",
|
||
"updated_at": "2022-05-24T05:24:31Z",
|
||
"pushed_at": "2022-05-05T22:49:40Z",
|
||
"stargazers_count": 26,
|
||
"watchers_count": 26,
|
||
"forks_count": 12,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 12,
|
||
"watchers": 26,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 489745068,
|
||
"name": "CVE-2022-1388-EXP",
|
||
"full_name": "bytecaps\/CVE-2022-1388-EXP",
|
||
"owner": {
|
||
"login": "bytecaps",
|
||
"id": 52679771,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/52679771?v=4",
|
||
"html_url": "https:\/\/github.com\/bytecaps"
|
||
},
|
||
"html_url": "https:\/\/github.com\/bytecaps\/CVE-2022-1388-EXP",
|
||
"description": "CVE-2022-1388 F5 BIG-IP RCE 批量检测",
|
||
"fork": false,
|
||
"created_at": "2022-05-07T17:54:08Z",
|
||
"updated_at": "2022-05-26T00:06:14Z",
|
||
"pushed_at": "2022-05-09T11:15:27Z",
|
||
"stargazers_count": 71,
|
||
"watchers_count": 71,
|
||
"forks_count": 22,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 22,
|
||
"watchers": 71,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 489899447,
|
||
"name": "CVE-2022-1388-RCE-checker-and-POC-Exploit",
|
||
"full_name": "blind-intruder\/CVE-2022-1388-RCE-checker-and-POC-Exploit",
|
||
"owner": {
|
||
"login": "blind-intruder",
|
||
"id": 41877347,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/41877347?v=4",
|
||
"html_url": "https:\/\/github.com\/blind-intruder"
|
||
},
|
||
"html_url": "https:\/\/github.com\/blind-intruder\/CVE-2022-1388-RCE-checker-and-POC-Exploit",
|
||
"description": null,
|
||
"fork": false,
|
||
"created_at": "2022-05-08T09:28:19Z",
|
||
"updated_at": "2022-05-10T12:40:23Z",
|
||
"pushed_at": "2022-05-12T11:46:56Z",
|
||
"stargazers_count": 4,
|
||
"watchers_count": 4,
|
||
"forks_count": 3,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 3,
|
||
"watchers": 4,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 490120378,
|
||
"name": "CVE-2022-1388",
|
||
"full_name": "Hudi233\/CVE-2022-1388",
|
||
"owner": {
|
||
"login": "Hudi233",
|
||
"id": 20939673,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20939673?v=4",
|
||
"html_url": "https:\/\/github.com\/Hudi233"
|
||
},
|
||
"html_url": "https:\/\/github.com\/Hudi233\/CVE-2022-1388",
|
||
"description": null,
|
||
"fork": false,
|
||
"created_at": "2022-05-09T03:20:46Z",
|
||
"updated_at": "2022-05-09T03:30:48Z",
|
||
"pushed_at": "2022-05-09T03:35:31Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 490182003,
|
||
"name": "CVE-2022-1388-Exploit-POC",
|
||
"full_name": "sherlocksecurity\/CVE-2022-1388-Exploit-POC",
|
||
"owner": {
|
||
"login": "sherlocksecurity",
|
||
"id": 52328067,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/52328067?v=4",
|
||
"html_url": "https:\/\/github.com\/sherlocksecurity"
|
||
},
|
||
"html_url": "https:\/\/github.com\/sherlocksecurity\/CVE-2022-1388-Exploit-POC",
|
||
"description": "PoC for CVE-2022-1388_F5_BIG-IP",
|
||
"fork": false,
|
||
"created_at": "2022-05-09T07:39:55Z",
|
||
"updated_at": "2022-05-26T00:06:19Z",
|
||
"pushed_at": "2022-05-15T02:30:40Z",
|
||
"stargazers_count": 55,
|
||
"watchers_count": 55,
|
||
"forks_count": 11,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 11,
|
||
"watchers": 55,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 490229104,
|
||
"name": "CVE-2022-1388",
|
||
"full_name": "yukar1z0e\/CVE-2022-1388",
|
||
"owner": {
|
||
"login": "yukar1z0e",
|
||
"id": 44317939,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44317939?v=4",
|
||
"html_url": "https:\/\/github.com\/yukar1z0e"
|
||
},
|
||
"html_url": "https:\/\/github.com\/yukar1z0e\/CVE-2022-1388",
|
||
"description": "batch scan CVE-2022-1388",
|
||
"fork": false,
|
||
"created_at": "2022-05-09T10:06:11Z",
|
||
"updated_at": "2022-05-09T15:40:02Z",
|
||
"pushed_at": "2022-05-09T10:07:45Z",
|
||
"stargazers_count": 2,
|
||
"watchers_count": 2,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 2,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 490234251,
|
||
"name": "CVE-2022-1388",
|
||
"full_name": "0xf4n9x\/CVE-2022-1388",
|
||
"owner": {
|
||
"login": "0xf4n9x",
|
||
"id": 40891670,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/40891670?v=4",
|
||
"html_url": "https:\/\/github.com\/0xf4n9x"
|
||
},
|
||
"html_url": "https:\/\/github.com\/0xf4n9x\/CVE-2022-1388",
|
||
"description": "CVE-2022-1388 F5 BIG-IP iControl REST Auth Bypass RCE",
|
||
"fork": false,
|
||
"created_at": "2022-05-09T10:22:31Z",
|
||
"updated_at": "2022-05-27T04:03:22Z",
|
||
"pushed_at": "2022-05-12T05:56:13Z",
|
||
"stargazers_count": 68,
|
||
"watchers_count": 68,
|
||
"forks_count": 27,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 27,
|
||
"watchers": 68,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 490237968,
|
||
"name": "CVE-2022-1388_PoC",
|
||
"full_name": "alt3kx\/CVE-2022-1388_PoC",
|
||
"owner": {
|
||
"login": "alt3kx",
|
||
"id": 3140111,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3140111?v=4",
|
||
"html_url": "https:\/\/github.com\/alt3kx"
|
||
},
|
||
"html_url": "https:\/\/github.com\/alt3kx\/CVE-2022-1388_PoC",
|
||
"description": "F5 BIG-IP RCE exploitation (CVE-2022-1388)",
|
||
"fork": false,
|
||
"created_at": "2022-05-09T10:34:38Z",
|
||
"updated_at": "2022-05-31T22:22:08Z",
|
||
"pushed_at": "2022-05-16T12:40:51Z",
|
||
"stargazers_count": 59,
|
||
"watchers_count": 59,
|
||
"forks_count": 11,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 11,
|
||
"watchers": 59,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 490241404,
|
||
"name": "F5-Big-IP-CVE-2022-1388",
|
||
"full_name": "Vulnmachines\/F5-Big-IP-CVE-2022-1388",
|
||
"owner": {
|
||
"login": "Vulnmachines",
|
||
"id": 79006904,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/79006904?v=4",
|
||
"html_url": "https:\/\/github.com\/Vulnmachines"
|
||
},
|
||
"html_url": "https:\/\/github.com\/Vulnmachines\/F5-Big-IP-CVE-2022-1388",
|
||
"description": "CVE-2022-1388 F5 Big IP unauth remote code execution",
|
||
"fork": false,
|
||
"created_at": "2022-05-09T10:46:19Z",
|
||
"updated_at": "2022-05-10T09:13:25Z",
|
||
"pushed_at": "2022-05-09T11:04:58Z",
|
||
"stargazers_count": 3,
|
||
"watchers_count": 3,
|
||
"forks_count": 2,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 2,
|
||
"watchers": 3,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 490254474,
|
||
"name": "F5-CVE-2022-1388-Exploit",
|
||
"full_name": "ZephrFish\/F5-CVE-2022-1388-Exploit",
|
||
"owner": {
|
||
"login": "ZephrFish",
|
||
"id": 5783068,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5783068?v=4",
|
||
"html_url": "https:\/\/github.com\/ZephrFish"
|
||
},
|
||
"html_url": "https:\/\/github.com\/ZephrFish\/F5-CVE-2022-1388-Exploit",
|
||
"description": "Exploit and Check Script for CVE 2022-1388",
|
||
"fork": false,
|
||
"created_at": "2022-05-09T11:30:09Z",
|
||
"updated_at": "2022-05-26T01:41:29Z",
|
||
"pushed_at": "2022-05-26T23:51:01Z",
|
||
"stargazers_count": 42,
|
||
"watchers_count": 42,
|
||
"forks_count": 24,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 24,
|
||
"watchers": 42,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 490259731,
|
||
"name": "CVE-2022-1388",
|
||
"full_name": "horizon3ai\/CVE-2022-1388",
|
||
"owner": {
|
||
"login": "horizon3ai",
|
||
"id": 79593994,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/79593994?v=4",
|
||
"html_url": "https:\/\/github.com\/horizon3ai"
|
||
},
|
||
"html_url": "https:\/\/github.com\/horizon3ai\/CVE-2022-1388",
|
||
"description": "POC for CVE-2022-1388",
|
||
"fork": false,
|
||
"created_at": "2022-05-09T11:46:45Z",
|
||
"updated_at": "2022-05-30T00:35:04Z",
|
||
"pushed_at": "2022-05-09T20:52:07Z",
|
||
"stargazers_count": 202,
|
||
"watchers_count": 202,
|
||
"forks_count": 32,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 32,
|
||
"watchers": 202,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 490307613,
|
||
"name": "CVE-2022-1388",
|
||
"full_name": "Al1ex\/CVE-2022-1388",
|
||
"owner": {
|
||
"login": "Al1ex",
|
||
"id": 38161463,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38161463?v=4",
|
||
"html_url": "https:\/\/github.com\/Al1ex"
|
||
},
|
||
"html_url": "https:\/\/github.com\/Al1ex\/CVE-2022-1388",
|
||
"description": "CVE-2022-1388 F5 BIG-IP iControl REST RCE",
|
||
"fork": false,
|
||
"created_at": "2022-05-09T14:01:38Z",
|
||
"updated_at": "2022-05-27T00:18:51Z",
|
||
"pushed_at": "2022-05-09T14:20:40Z",
|
||
"stargazers_count": 19,
|
||
"watchers_count": 19,
|
||
"forks_count": 6,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [
|
||
"cve-2022-1388",
|
||
"f5-big-ip-icontrol-rest-rce"
|
||
],
|
||
"visibility": "public",
|
||
"forks": 6,
|
||
"watchers": 19,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 490307975,
|
||
"name": "CVE-2022-1388",
|
||
"full_name": "Henry4E36\/CVE-2022-1388",
|
||
"owner": {
|
||
"login": "Henry4E36",
|
||
"id": 41940481,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/41940481?v=4",
|
||
"html_url": "https:\/\/github.com\/Henry4E36"
|
||
},
|
||
"html_url": "https:\/\/github.com\/Henry4E36\/CVE-2022-1388",
|
||
"description": "F5 BIG-IP iControl REST身份验证绕过漏洞",
|
||
"fork": false,
|
||
"created_at": "2022-05-09T14:02:34Z",
|
||
"updated_at": "2022-05-15T13:30:09Z",
|
||
"pushed_at": "2022-05-13T12:06:19Z",
|
||
"stargazers_count": 6,
|
||
"watchers_count": 6,
|
||
"forks_count": 1,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 1,
|
||
"watchers": 6,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 490310701,
|
||
"name": "CVE-2022-1388-mass",
|
||
"full_name": "cve-hunter\/CVE-2022-1388-mass",
|
||
"owner": {
|
||
"login": "cve-hunter",
|
||
"id": 104981226,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/104981226?v=4",
|
||
"html_url": "https:\/\/github.com\/cve-hunter"
|
||
},
|
||
"html_url": "https:\/\/github.com\/cve-hunter\/CVE-2022-1388-mass",
|
||
"description": null,
|
||
"fork": false,
|
||
"created_at": "2022-05-09T14:09:49Z",
|
||
"updated_at": "2022-05-09T14:24:04Z",
|
||
"pushed_at": "2022-05-09T14:25:24Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 490321219,
|
||
"name": "CVE-2022-1388",
|
||
"full_name": "savior-only\/CVE-2022-1388",
|
||
"owner": {
|
||
"login": "savior-only",
|
||
"id": 69495405,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/69495405?v=4",
|
||
"html_url": "https:\/\/github.com\/savior-only"
|
||
},
|
||
"html_url": "https:\/\/github.com\/savior-only\/CVE-2022-1388",
|
||
"description": "CVE-2022-1388 F5 BIG-IP iControl REST身份验证绕过漏洞",
|
||
"fork": false,
|
||
"created_at": "2022-05-09T14:37:04Z",
|
||
"updated_at": "2022-05-09T14:39:16Z",
|
||
"pushed_at": "2022-05-13T18:18:48Z",
|
||
"stargazers_count": 2,
|
||
"watchers_count": 2,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 2,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 490339060,
|
||
"name": "CVE-2022-1388",
|
||
"full_name": "saucer-man\/CVE-2022-1388",
|
||
"owner": {
|
||
"login": "saucer-man",
|
||
"id": 32133080,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/32133080?v=4",
|
||
"html_url": "https:\/\/github.com\/saucer-man"
|
||
},
|
||
"html_url": "https:\/\/github.com\/saucer-man\/CVE-2022-1388",
|
||
"description": "CVE-2022-1388",
|
||
"fork": false,
|
||
"created_at": "2022-05-09T15:24:27Z",
|
||
"updated_at": "2022-05-09T16:10:58Z",
|
||
"pushed_at": "2022-05-09T16:14:49Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 1,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 1,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 490345813,
|
||
"name": "CVE-2022-1388",
|
||
"full_name": "superzerosec\/CVE-2022-1388",
|
||
"owner": {
|
||
"login": "superzerosec",
|
||
"id": 57648217,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57648217?v=4",
|
||
"html_url": "https:\/\/github.com\/superzerosec"
|
||
},
|
||
"html_url": "https:\/\/github.com\/superzerosec\/CVE-2022-1388",
|
||
"description": "CVE-2022-1388 POC exploit",
|
||
"fork": false,
|
||
"created_at": "2022-05-09T15:42:55Z",
|
||
"updated_at": "2022-05-10T21:07:51Z",
|
||
"pushed_at": "2022-05-10T04:53:23Z",
|
||
"stargazers_count": 1,
|
||
"watchers_count": 1,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 1,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 490383212,
|
||
"name": "CVE-2022-1388-RCE-checker",
|
||
"full_name": "trhacknon\/CVE-2022-1388-RCE-checker",
|
||
"owner": {
|
||
"login": "trhacknon",
|
||
"id": 98242014,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/98242014?v=4",
|
||
"html_url": "https:\/\/github.com\/trhacknon"
|
||
},
|
||
"html_url": "https:\/\/github.com\/trhacknon\/CVE-2022-1388-RCE-checker",
|
||
"description": null,
|
||
"fork": false,
|
||
"created_at": "2022-05-09T17:34:28Z",
|
||
"updated_at": "2022-05-09T17:34:39Z",
|
||
"pushed_at": "2022-05-09T17:34:36Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 490521216,
|
||
"name": "Exploit-F5-CVE-2022-1388",
|
||
"full_name": "Stonzyy\/Exploit-F5-CVE-2022-1388",
|
||
"owner": {
|
||
"login": "Stonzyy",
|
||
"id": 33039121,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33039121?v=4",
|
||
"html_url": "https:\/\/github.com\/Stonzyy"
|
||
},
|
||
"html_url": "https:\/\/github.com\/Stonzyy\/Exploit-F5-CVE-2022-1388",
|
||
"description": "PoC For F5 BIG-IP - bash script Exploit one Liner",
|
||
"fork": false,
|
||
"created_at": "2022-05-10T02:57:31Z",
|
||
"updated_at": "2022-05-30T06:16:51Z",
|
||
"pushed_at": "2022-05-10T08:38:58Z",
|
||
"stargazers_count": 9,
|
||
"watchers_count": 9,
|
||
"forks_count": 3,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 3,
|
||
"watchers": 9,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 490537604,
|
||
"name": "Nuclei-Template-Exploit-F5-BIG-IP-iControl-REST-Auth-Bypass-RCE-Command-Parameter",
|
||
"full_name": "MrCl0wnLab\/Nuclei-Template-Exploit-F5-BIG-IP-iControl-REST-Auth-Bypass-RCE-Command-Parameter",
|
||
"owner": {
|
||
"login": "MrCl0wnLab",
|
||
"id": 17049332,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17049332?v=4",
|
||
"html_url": "https:\/\/github.com\/MrCl0wnLab"
|
||
},
|
||
"html_url": "https:\/\/github.com\/MrCl0wnLab\/Nuclei-Template-Exploit-F5-BIG-IP-iControl-REST-Auth-Bypass-RCE-Command-Parameter",
|
||
"description": "CVE-2022-1388 is an authentication bypass vulnerability in the REST component of BIG-IP’s iControl API that was assigned a CVSSv3 score of 9.8. The iControl REST API is used for the management and configuration of BIG-IP devices. CVE-2022-1388 could be exploited by an unauthenticated attacker with network access to the management port or self IP addresses of devices that use BIG-IP. Exploitation would allow the attacker to execute arbitrary system commands, create and delete files and disable services.",
|
||
"fork": false,
|
||
"created_at": "2022-05-10T04:10:46Z",
|
||
"updated_at": "2022-05-12T17:04:20Z",
|
||
"pushed_at": "2022-05-12T17:06:29Z",
|
||
"stargazers_count": 3,
|
||
"watchers_count": 3,
|
||
"forks_count": 1,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [
|
||
"bigip",
|
||
"bigip-rest-api",
|
||
"cve-2022-1388",
|
||
"exploit",
|
||
"f5-bigip",
|
||
"nuclei",
|
||
"nuclei-templates"
|
||
],
|
||
"visibility": "public",
|
||
"forks": 1,
|
||
"watchers": 3,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 490544324,
|
||
"name": "F5-BigIP-CVE-2022-1388",
|
||
"full_name": "qusaialhaddad\/F5-BigIP-CVE-2022-1388",
|
||
"owner": {
|
||
"login": "qusaialhaddad",
|
||
"id": 9527146,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/9527146?v=4",
|
||
"html_url": "https:\/\/github.com\/qusaialhaddad"
|
||
},
|
||
"html_url": "https:\/\/github.com\/qusaialhaddad\/F5-BigIP-CVE-2022-1388",
|
||
"description": "Reverse Shell for CVE-2022-1388",
|
||
"fork": false,
|
||
"created_at": "2022-05-10T04:44:05Z",
|
||
"updated_at": "2022-05-15T02:58:27Z",
|
||
"pushed_at": "2022-05-10T05:00:43Z",
|
||
"stargazers_count": 8,
|
||
"watchers_count": 8,
|
||
"forks_count": 2,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 2,
|
||
"watchers": 8,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 490545813,
|
||
"name": "CVE-2022-1388",
|
||
"full_name": "chesterblue\/CVE-2022-1388",
|
||
"owner": {
|
||
"login": "chesterblue",
|
||
"id": 38368702,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38368702?v=4",
|
||
"html_url": "https:\/\/github.com\/chesterblue"
|
||
},
|
||
"html_url": "https:\/\/github.com\/chesterblue\/CVE-2022-1388",
|
||
"description": "POC of CVE-2022-1388",
|
||
"fork": false,
|
||
"created_at": "2022-05-10T04:51:06Z",
|
||
"updated_at": "2022-05-10T05:01:29Z",
|
||
"pushed_at": "2022-05-10T04:58:30Z",
|
||
"stargazers_count": 1,
|
||
"watchers_count": 1,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 1,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 490554565,
|
||
"name": "F5-BIG-IP-RCE-CVE-2022-1388",
|
||
"full_name": "Angus-Team\/F5-BIG-IP-RCE-CVE-2022-1388",
|
||
"owner": {
|
||
"login": "Angus-Team",
|
||
"id": 103045627,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/103045627?v=4",
|
||
"html_url": "https:\/\/github.com\/Angus-Team"
|
||
},
|
||
"html_url": "https:\/\/github.com\/Angus-Team\/F5-BIG-IP-RCE-CVE-2022-1388",
|
||
"description": null,
|
||
"fork": false,
|
||
"created_at": "2022-05-10T05:30:11Z",
|
||
"updated_at": "2022-05-10T05:35:26Z",
|
||
"pushed_at": "2022-05-10T05:35:23Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 1,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 1,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 490586814,
|
||
"name": "CVE-2022-1388",
|
||
"full_name": "hou5\/CVE-2022-1388",
|
||
"owner": {
|
||
"login": "hou5",
|
||
"id": 49178491,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/49178491?v=4",
|
||
"html_url": "https:\/\/github.com\/hou5"
|
||
},
|
||
"html_url": "https:\/\/github.com\/hou5\/CVE-2022-1388",
|
||
"description": "CVE-2022-1388_goby_pocsuite3",
|
||
"fork": false,
|
||
"created_at": "2022-05-10T07:24:33Z",
|
||
"updated_at": "2022-05-25T11:40:03Z",
|
||
"pushed_at": "2022-05-16T01:04:35Z",
|
||
"stargazers_count": 3,
|
||
"watchers_count": 3,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 3,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 490601730,
|
||
"name": "CVE-2022-1388-EXP",
|
||
"full_name": "LinJacck\/CVE-2022-1388-EXP",
|
||
"owner": {
|
||
"login": "LinJacck",
|
||
"id": 57176639,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57176639?v=4",
|
||
"html_url": "https:\/\/github.com\/LinJacck"
|
||
},
|
||
"html_url": "https:\/\/github.com\/LinJacck\/CVE-2022-1388-EXP",
|
||
"description": "CVE-2022-1388-EXP可批量实现攻击",
|
||
"fork": false,
|
||
"created_at": "2022-05-10T08:09:30Z",
|
||
"updated_at": "2022-05-10T13:06:26Z",
|
||
"pushed_at": "2022-05-10T08:14:49Z",
|
||
"stargazers_count": 2,
|
||
"watchers_count": 2,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 2,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 490606277,
|
||
"name": "cve-2022-1388-1veresk",
|
||
"full_name": "iveresk\/cve-2022-1388-1veresk",
|
||
"owner": {
|
||
"login": "iveresk",
|
||
"id": 28754633,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/28754633?v=4",
|
||
"html_url": "https:\/\/github.com\/iveresk"
|
||
},
|
||
"html_url": "https:\/\/github.com\/iveresk\/cve-2022-1388-1veresk",
|
||
"description": "Simple shell script for the exploit",
|
||
"fork": false,
|
||
"created_at": "2022-05-10T08:22:46Z",
|
||
"updated_at": "2022-05-10T08:31:03Z",
|
||
"pushed_at": "2022-05-24T12:39:02Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 490613608,
|
||
"name": "CVE-2022-1388",
|
||
"full_name": "shamo0\/CVE-2022-1388",
|
||
"owner": {
|
||
"login": "shamo0",
|
||
"id": 48299520,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/48299520?v=4",
|
||
"html_url": "https:\/\/github.com\/shamo0"
|
||
},
|
||
"html_url": "https:\/\/github.com\/shamo0\/CVE-2022-1388",
|
||
"description": "BIG-IP iControl REST vulnerability CVE-2022-1388 PoC",
|
||
"fork": false,
|
||
"created_at": "2022-05-10T08:44:24Z",
|
||
"updated_at": "2022-05-10T10:15:46Z",
|
||
"pushed_at": "2022-05-10T09:09:23Z",
|
||
"stargazers_count": 1,
|
||
"watchers_count": 1,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [
|
||
"1388",
|
||
"2022",
|
||
"bash",
|
||
"bigip",
|
||
"cve",
|
||
"cve-2022-1388",
|
||
"exploit",
|
||
"f5",
|
||
"icontrol",
|
||
"python",
|
||
"rest",
|
||
"script",
|
||
"shell",
|
||
"vulnerabilit"
|
||
],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 1,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 490623250,
|
||
"name": "CVE-2022-1388-F5-BIG-IP",
|
||
"full_name": "vesperp\/CVE-2022-1388-F5-BIG-IP",
|
||
"owner": {
|
||
"login": "vesperp",
|
||
"id": 28191544,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/28191544?v=4",
|
||
"html_url": "https:\/\/github.com\/vesperp"
|
||
},
|
||
"html_url": "https:\/\/github.com\/vesperp\/CVE-2022-1388-F5-BIG-IP",
|
||
"description": null,
|
||
"fork": false,
|
||
"created_at": "2022-05-10T09:12:22Z",
|
||
"updated_at": "2022-05-18T08:46:17Z",
|
||
"pushed_at": "2022-05-18T08:32:27Z",
|
||
"stargazers_count": 1,
|
||
"watchers_count": 1,
|
||
"forks_count": 1,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 1,
|
||
"watchers": 1,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 490752282,
|
||
"name": "CVE-2022-1388-Exploit",
|
||
"full_name": "thatonesecguy\/CVE-2022-1388-Exploit",
|
||
"owner": {
|
||
"login": "thatonesecguy",
|
||
"id": 34110198,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/34110198?v=4",
|
||
"html_url": "https:\/\/github.com\/thatonesecguy"
|
||
},
|
||
"html_url": "https:\/\/github.com\/thatonesecguy\/CVE-2022-1388-Exploit",
|
||
"description": "Test and Exploit Scripts for CVE 2022-1388 (F5 Big-IP)",
|
||
"fork": false,
|
||
"created_at": "2022-05-10T15:16:12Z",
|
||
"updated_at": "2022-05-28T12:39:37Z",
|
||
"pushed_at": "2022-05-10T15:28:13Z",
|
||
"stargazers_count": 3,
|
||
"watchers_count": 3,
|
||
"forks_count": 1,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 1,
|
||
"watchers": 3,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 490758825,
|
||
"name": "CVE2022-1388_TestAPI",
|
||
"full_name": "bandit92\/CVE2022-1388_TestAPI",
|
||
"owner": {
|
||
"login": "bandit92",
|
||
"id": 11216382,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11216382?v=4",
|
||
"html_url": "https:\/\/github.com\/bandit92"
|
||
},
|
||
"html_url": "https:\/\/github.com\/bandit92\/CVE2022-1388_TestAPI",
|
||
"description": "A Test API for testing the POC against CVE-2022-1388",
|
||
"fork": false,
|
||
"created_at": "2022-05-10T15:34:14Z",
|
||
"updated_at": "2022-05-26T21:22:13Z",
|
||
"pushed_at": "2022-05-10T15:37:42Z",
|
||
"stargazers_count": 4,
|
||
"watchers_count": 4,
|
||
"forks_count": 2,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 2,
|
||
"watchers": 4,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 490762622,
|
||
"name": "CVE-2022-1388-PocExp",
|
||
"full_name": "aodsec\/CVE-2022-1388-PocExp",
|
||
"owner": {
|
||
"login": "aodsec",
|
||
"id": 96908273,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/96908273?v=4",
|
||
"html_url": "https:\/\/github.com\/aodsec"
|
||
},
|
||
"html_url": "https:\/\/github.com\/aodsec\/CVE-2022-1388-PocExp",
|
||
"description": "CVE-2022-1388-PocExp,新增了多线程,F5 BIG-IP RCE exploitation",
|
||
"fork": false,
|
||
"created_at": "2022-05-10T15:44:50Z",
|
||
"updated_at": "2022-05-28T12:39:06Z",
|
||
"pushed_at": "2022-05-16T14:02:29Z",
|
||
"stargazers_count": 4,
|
||
"watchers_count": 4,
|
||
"forks_count": 1,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 1,
|
||
"watchers": 4,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 490856318,
|
||
"name": "CVE-2022-1388",
|
||
"full_name": "0xAgun\/CVE-2022-1388",
|
||
"owner": {
|
||
"login": "0xAgun",
|
||
"id": 78228966,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/78228966?v=4",
|
||
"html_url": "https:\/\/github.com\/0xAgun"
|
||
},
|
||
"html_url": "https:\/\/github.com\/0xAgun\/CVE-2022-1388",
|
||
"description": null,
|
||
"fork": false,
|
||
"created_at": "2022-05-10T20:49:12Z",
|
||
"updated_at": "2022-05-10T20:50:02Z",
|
||
"pushed_at": "2022-05-14T15:01:16Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 490900227,
|
||
"name": "CVE-2022-1388-BIG-IP-Mass-Exploit",
|
||
"full_name": "ExploitPwner\/CVE-2022-1388-BIG-IP-Mass-Exploit",
|
||
"owner": {
|
||
"login": "ExploitPwner",
|
||
"id": 103929208,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/103929208?v=4",
|
||
"html_url": "https:\/\/github.com\/ExploitPwner"
|
||
},
|
||
"html_url": "https:\/\/github.com\/ExploitPwner\/CVE-2022-1388-BIG-IP-Mass-Exploit",
|
||
"description": "On F5 BIG-IP undisclosed requests may bypass iControl REST authentication. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated ",
|
||
"fork": false,
|
||
"created_at": "2022-05-11T00:15:07Z",
|
||
"updated_at": "2022-05-17T15:51:19Z",
|
||
"pushed_at": "2022-05-17T15:51:16Z",
|
||
"stargazers_count": 1,
|
||
"watchers_count": 1,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [
|
||
"0day",
|
||
"cve-2021-44228",
|
||
"exploit",
|
||
"mass",
|
||
"mass-exploit",
|
||
"zeroday"
|
||
],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 1,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 491157577,
|
||
"name": "cve-2022-1388-mass",
|
||
"full_name": "kuznyJan1972\/cve-2022-1388-mass",
|
||
"owner": {
|
||
"login": "kuznyJan1972",
|
||
"id": 105104025,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/105104025?v=4",
|
||
"html_url": "https:\/\/github.com\/kuznyJan1972"
|
||
},
|
||
"html_url": "https:\/\/github.com\/kuznyJan1972\/cve-2022-1388-mass",
|
||
"description": "big-ip icontrol rest auth bypass RCE MASS with huge list of ip dumped",
|
||
"fork": false,
|
||
"created_at": "2022-05-11T14:57:31Z",
|
||
"updated_at": "2022-05-11T15:02:07Z",
|
||
"pushed_at": "2022-05-11T15:02:03Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 491215019,
|
||
"name": "CVE-2022-1388-Scanner",
|
||
"full_name": "AmirHoseinTangsiriNET\/CVE-2022-1388-Scanner",
|
||
"owner": {
|
||
"login": "AmirHoseinTangsiriNET",
|
||
"id": 64230943,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/64230943?v=4",
|
||
"html_url": "https:\/\/github.com\/AmirHoseinTangsiriNET"
|
||
},
|
||
"html_url": "https:\/\/github.com\/AmirHoseinTangsiriNET\/CVE-2022-1388-Scanner",
|
||
"description": null,
|
||
"fork": false,
|
||
"created_at": "2022-05-11T17:43:44Z",
|
||
"updated_at": "2022-05-23T01:22:04Z",
|
||
"pushed_at": "2022-05-27T11:27:32Z",
|
||
"stargazers_count": 5,
|
||
"watchers_count": 5,
|
||
"forks_count": 2,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 2,
|
||
"watchers": 5,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 491248239,
|
||
"name": "CVE-2022-1388",
|
||
"full_name": "EvilLizard666\/CVE-2022-1388",
|
||
"owner": {
|
||
"login": "EvilLizard666",
|
||
"id": 46286364,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/46286364?v=4",
|
||
"html_url": "https:\/\/github.com\/EvilLizard666"
|
||
},
|
||
"html_url": "https:\/\/github.com\/EvilLizard666\/CVE-2022-1388",
|
||
"description": "CVE-2022-1388 Scanner",
|
||
"fork": false,
|
||
"created_at": "2022-05-11T19:33:37Z",
|
||
"updated_at": "2022-05-20T13:27:59Z",
|
||
"pushed_at": "2022-05-11T19:39:01Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 491258779,
|
||
"name": "CVE-2022-1388",
|
||
"full_name": "mr-vill4in\/CVE-2022-1388",
|
||
"owner": {
|
||
"login": "mr-vill4in",
|
||
"id": 51061936,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51061936?v=4",
|
||
"html_url": "https:\/\/github.com\/mr-vill4in"
|
||
},
|
||
"html_url": "https:\/\/github.com\/mr-vill4in\/CVE-2022-1388",
|
||
"description": "CVE-2022-1388",
|
||
"fork": false,
|
||
"created_at": "2022-05-11T20:13:09Z",
|
||
"updated_at": "2022-05-15T06:59:51Z",
|
||
"pushed_at": "2022-05-11T20:15:49Z",
|
||
"stargazers_count": 1,
|
||
"watchers_count": 1,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 1,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 491262541,
|
||
"name": "CVE-2022-1388",
|
||
"full_name": "omnigodz\/CVE-2022-1388",
|
||
"owner": {
|
||
"login": "omnigodz",
|
||
"id": 20488509,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20488509?v=4",
|
||
"html_url": "https:\/\/github.com\/omnigodz"
|
||
},
|
||
"html_url": "https:\/\/github.com\/omnigodz\/CVE-2022-1388",
|
||
"description": "This repository consists of the python exploit for CVE-2022-1388 (F5's BIG-IP Authentication Bypass to RCE) ",
|
||
"fork": false,
|
||
"created_at": "2022-05-11T20:27:36Z",
|
||
"updated_at": "2022-05-11T20:27:59Z",
|
||
"pushed_at": "2022-05-11T20:27:56Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 491283164,
|
||
"name": "CVE-2022-1388",
|
||
"full_name": "pauloink\/CVE-2022-1388",
|
||
"owner": {
|
||
"login": "pauloink",
|
||
"id": 64289774,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/64289774?v=4",
|
||
"html_url": "https:\/\/github.com\/pauloink"
|
||
},
|
||
"html_url": "https:\/\/github.com\/pauloink\/CVE-2022-1388",
|
||
"description": null,
|
||
"fork": false,
|
||
"created_at": "2022-05-11T21:55:43Z",
|
||
"updated_at": "2022-05-11T22:00:15Z",
|
||
"pushed_at": "2022-05-11T22:00:12Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 1,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 1,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 491500644,
|
||
"name": "CVE-2022-1388",
|
||
"full_name": "SecTheBit\/CVE-2022-1388",
|
||
"owner": {
|
||
"login": "SecTheBit",
|
||
"id": 46895441,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/46895441?v=4",
|
||
"html_url": "https:\/\/github.com\/SecTheBit"
|
||
},
|
||
"html_url": "https:\/\/github.com\/SecTheBit\/CVE-2022-1388",
|
||
"description": "Nuclei Template for CVE-2022-1388",
|
||
"fork": false,
|
||
"created_at": "2022-05-12T12:17:11Z",
|
||
"updated_at": "2022-05-13T06:43:45Z",
|
||
"pushed_at": "2022-05-12T12:32:38Z",
|
||
"stargazers_count": 1,
|
||
"watchers_count": 1,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 1,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 491598048,
|
||
"name": "CVE-2022-1388",
|
||
"full_name": "Zeyad-Azima\/CVE-2022-1388",
|
||
"owner": {
|
||
"login": "Zeyad-Azima",
|
||
"id": 62406753,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/62406753?v=4",
|
||
"html_url": "https:\/\/github.com\/Zeyad-Azima"
|
||
},
|
||
"html_url": "https:\/\/github.com\/Zeyad-Azima\/CVE-2022-1388",
|
||
"description": "F5 BIG-IP iControl REST vulnerability RCE exploit with Java including a testing LAB",
|
||
"fork": false,
|
||
"created_at": "2022-05-12T16:54:52Z",
|
||
"updated_at": "2022-05-22T15:13:25Z",
|
||
"pushed_at": "2022-05-13T23:23:45Z",
|
||
"stargazers_count": 7,
|
||
"watchers_count": 7,
|
||
"forks_count": 4,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [
|
||
"cve",
|
||
"cve-2022-1388",
|
||
"exploit",
|
||
"f5",
|
||
"f5-bigip",
|
||
"icontrol",
|
||
"rest-api"
|
||
],
|
||
"visibility": "public",
|
||
"forks": 4,
|
||
"watchers": 7,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 491851727,
|
||
"name": "CVE-2022-1388",
|
||
"full_name": "justakazh\/CVE-2022-1388",
|
||
"owner": {
|
||
"login": "justakazh",
|
||
"id": 36891477,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/36891477?v=4",
|
||
"html_url": "https:\/\/github.com\/justakazh"
|
||
},
|
||
"html_url": "https:\/\/github.com\/justakazh\/CVE-2022-1388",
|
||
"description": "Tool for CVE-2022-1388 ",
|
||
"fork": false,
|
||
"created_at": "2022-05-13T10:18:29Z",
|
||
"updated_at": "2022-05-21T09:09:17Z",
|
||
"pushed_at": "2022-05-13T10:22:08Z",
|
||
"stargazers_count": 12,
|
||
"watchers_count": 12,
|
||
"forks_count": 2,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 2,
|
||
"watchers": 12,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 492382276,
|
||
"name": "CVE-2022-1388-POC",
|
||
"full_name": "PsychoSec2\/CVE-2022-1388-POC",
|
||
"owner": {
|
||
"login": "PsychoSec2",
|
||
"id": 102695468,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102695468?v=4",
|
||
"html_url": "https:\/\/github.com\/PsychoSec2"
|
||
},
|
||
"html_url": "https:\/\/github.com\/PsychoSec2\/CVE-2022-1388-POC",
|
||
"description": "An Improved Proof of Concept for CVE-2022-1388 w\/ an Interactive Shell",
|
||
"fork": false,
|
||
"created_at": "2022-05-15T03:58:21Z",
|
||
"updated_at": "2022-05-19T10:32:46Z",
|
||
"pushed_at": "2022-05-15T16:34:54Z",
|
||
"stargazers_count": 5,
|
||
"watchers_count": 5,
|
||
"forks_count": 1,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 1,
|
||
"watchers": 5,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 492435532,
|
||
"name": "cve-2022-1388-iveresk-command-shell",
|
||
"full_name": "iveresk\/cve-2022-1388-iveresk-command-shell",
|
||
"owner": {
|
||
"login": "iveresk",
|
||
"id": 28754633,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/28754633?v=4",
|
||
"html_url": "https:\/\/github.com\/iveresk"
|
||
},
|
||
"html_url": "https:\/\/github.com\/iveresk\/cve-2022-1388-iveresk-command-shell",
|
||
"description": "Improved POC for CVE-2022-1388 that affects multiple F5 products.",
|
||
"fork": false,
|
||
"created_at": "2022-05-15T08:58:22Z",
|
||
"updated_at": "2022-05-18T05:53:50Z",
|
||
"pushed_at": "2022-05-24T12:39:26Z",
|
||
"stargazers_count": 1,
|
||
"watchers_count": 1,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 1,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 492651669,
|
||
"name": "CVE-2022-1388",
|
||
"full_name": "Wrin9\/CVE-2022-1388",
|
||
"owner": {
|
||
"login": "Wrin9",
|
||
"id": 54984589,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/54984589?v=4",
|
||
"html_url": "https:\/\/github.com\/Wrin9"
|
||
},
|
||
"html_url": "https:\/\/github.com\/Wrin9\/CVE-2022-1388",
|
||
"description": null,
|
||
"fork": false,
|
||
"created_at": "2022-05-16T01:49:44Z",
|
||
"updated_at": "2022-05-16T01:49:44Z",
|
||
"pushed_at": "2022-05-16T01:52:19Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 493080053,
|
||
"name": "F5-BIG-IP-exploit",
|
||
"full_name": "getdrive\/F5-BIG-IP-exploit",
|
||
"owner": {
|
||
"login": "getdrive",
|
||
"id": 20697688,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20697688?v=4",
|
||
"html_url": "https:\/\/github.com\/getdrive"
|
||
},
|
||
"html_url": "https:\/\/github.com\/getdrive\/F5-BIG-IP-exploit",
|
||
"description": "CVE-2022-1388",
|
||
"fork": false,
|
||
"created_at": "2022-05-17T03:23:39Z",
|
||
"updated_at": "2022-05-17T03:24:54Z",
|
||
"pushed_at": "2022-05-17T10:45:04Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 493209789,
|
||
"name": "CVE-2022-1388-rs",
|
||
"full_name": "aancw\/CVE-2022-1388-rs",
|
||
"owner": {
|
||
"login": "aancw",
|
||
"id": 6284204,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6284204?v=4",
|
||
"html_url": "https:\/\/github.com\/aancw"
|
||
},
|
||
"html_url": "https:\/\/github.com\/aancw\/CVE-2022-1388-rs",
|
||
"description": "CVE-2022-1388 F5 BIG-IP iControl REST Auth Bypass RCE written in Rust",
|
||
"fork": false,
|
||
"created_at": "2022-05-17T10:51:39Z",
|
||
"updated_at": "2022-05-19T04:36:29Z",
|
||
"pushed_at": "2022-05-31T10:24:39Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 495049125,
|
||
"name": "CVE-2022-1388-mass",
|
||
"full_name": "seciurdt\/CVE-2022-1388-mass",
|
||
"owner": {
|
||
"login": "seciurdt",
|
||
"id": 105104248,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/105104248?v=4",
|
||
"html_url": "https:\/\/github.com\/seciurdt"
|
||
},
|
||
"html_url": "https:\/\/github.com\/seciurdt\/CVE-2022-1388-mass",
|
||
"description": "Big-Ip auth bypass and rce",
|
||
"fork": false,
|
||
"created_at": "2022-05-22T12:08:25Z",
|
||
"updated_at": "2022-05-22T12:09:19Z",
|
||
"pushed_at": "2022-05-22T12:13:06Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 495067625,
|
||
"name": "CVE-2022-1388",
|
||
"full_name": "XmasSnowISBACK\/CVE-2022-1388",
|
||
"owner": {
|
||
"login": "XmasSnowISBACK",
|
||
"id": 105931778,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/105931778?v=4",
|
||
"html_url": "https:\/\/github.com\/XmasSnowISBACK"
|
||
},
|
||
"html_url": "https:\/\/github.com\/XmasSnowISBACK\/CVE-2022-1388",
|
||
"description": "CVE-2022-1388 F5 BIG-IP iControl REST Auth Bypass RCE written in Rust ",
|
||
"fork": false,
|
||
"created_at": "2022-05-22T13:27:33Z",
|
||
"updated_at": "2022-05-26T19:00:44Z",
|
||
"pushed_at": "2022-05-22T13:46:18Z",
|
||
"stargazers_count": 3,
|
||
"watchers_count": 3,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 3,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 497313238,
|
||
"name": "CVE-2022-1388",
|
||
"full_name": "trhacknon\/CVE-2022-1388",
|
||
"owner": {
|
||
"login": "trhacknon",
|
||
"id": 98242014,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/98242014?v=4",
|
||
"html_url": "https:\/\/github.com\/trhacknon"
|
||
},
|
||
"html_url": "https:\/\/github.com\/trhacknon\/CVE-2022-1388",
|
||
"description": null,
|
||
"fork": false,
|
||
"created_at": "2022-05-28T12:35:59Z",
|
||
"updated_at": "2022-05-28T12:36:10Z",
|
||
"pushed_at": "2022-05-28T12:36:07Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 497314363,
|
||
"name": "F5-CVE-2022-1388-Exploit",
|
||
"full_name": "trhacknon\/F5-CVE-2022-1388-Exploit",
|
||
"owner": {
|
||
"login": "trhacknon",
|
||
"id": 98242014,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/98242014?v=4",
|
||
"html_url": "https:\/\/github.com\/trhacknon"
|
||
},
|
||
"html_url": "https:\/\/github.com\/trhacknon\/F5-CVE-2022-1388-Exploit",
|
||
"description": null,
|
||
"fork": false,
|
||
"created_at": "2022-05-28T12:40:56Z",
|
||
"updated_at": "2022-05-28T12:41:07Z",
|
||
"pushed_at": "2022-05-28T12:41:04Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 497314878,
|
||
"name": "Exploit-F5-CVE-2022-1388",
|
||
"full_name": "trhacknon\/Exploit-F5-CVE-2022-1388",
|
||
"owner": {
|
||
"login": "trhacknon",
|
||
"id": 98242014,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/98242014?v=4",
|
||
"html_url": "https:\/\/github.com\/trhacknon"
|
||
},
|
||
"html_url": "https:\/\/github.com\/trhacknon\/Exploit-F5-CVE-2022-1388",
|
||
"description": null,
|
||
"fork": false,
|
||
"created_at": "2022-05-28T12:43:18Z",
|
||
"updated_at": "2022-05-28T12:43:29Z",
|
||
"pushed_at": "2022-05-28T12:43:26Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 497315561,
|
||
"name": "CVE-2022-1388-PocExp",
|
||
"full_name": "trhacknon\/CVE-2022-1388-PocExp",
|
||
"owner": {
|
||
"login": "trhacknon",
|
||
"id": 98242014,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/98242014?v=4",
|
||
"html_url": "https:\/\/github.com\/trhacknon"
|
||
},
|
||
"html_url": "https:\/\/github.com\/trhacknon\/CVE-2022-1388-PocExp",
|
||
"description": null,
|
||
"fork": false,
|
||
"created_at": "2022-05-28T12:46:08Z",
|
||
"updated_at": "2022-05-28T12:46:19Z",
|
||
"pushed_at": "2022-05-28T12:46:16Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 497326298,
|
||
"name": "F5-BIG-IP-POC",
|
||
"full_name": "west9b\/F5-BIG-IP-POC",
|
||
"owner": {
|
||
"login": "west9b",
|
||
"id": 103512651,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/103512651?v=4",
|
||
"html_url": "https:\/\/github.com\/west9b"
|
||
},
|
||
"html_url": "https:\/\/github.com\/west9b\/F5-BIG-IP-POC",
|
||
"description": "CVE-2020-5902 CVE-2021-22986 CVE-2022-1388 POC集合",
|
||
"fork": false,
|
||
"created_at": "2022-05-28T13:30:22Z",
|
||
"updated_at": "2022-05-30T22:26:50Z",
|
||
"pushed_at": "2022-05-28T14:25:22Z",
|
||
"stargazers_count": 4,
|
||
"watchers_count": 4,
|
||
"forks_count": 1,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 1,
|
||
"watchers": 4,
|
||
"score": 0
|
||
}
|
||
] |