mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-29 02:54:10 +01:00
518 lines
No EOL
17 KiB
JSON
518 lines
No EOL
17 KiB
JSON
[
|
|
{
|
|
"id": 488929451,
|
|
"name": "CVE-2022-1388",
|
|
"full_name": "numanturle\/CVE-2022-1388",
|
|
"owner": {
|
|
"login": "numanturle",
|
|
"id": 7007951,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7007951?v=4",
|
|
"html_url": "https:\/\/github.com\/numanturle"
|
|
},
|
|
"html_url": "https:\/\/github.com\/numanturle\/CVE-2022-1388",
|
|
"description": "K23605346: BIG-IP iControl REST vulnerability CVE-2022-1388",
|
|
"fork": false,
|
|
"created_at": "2022-05-05T10:35:35Z",
|
|
"updated_at": "2022-05-09T19:34:21Z",
|
|
"pushed_at": "2022-05-09T21:09:45Z",
|
|
"stargazers_count": 38,
|
|
"watchers_count": 38,
|
|
"forks_count": 12,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 12,
|
|
"watchers": 38,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 489745068,
|
|
"name": "CVE-2022-1388-EXP",
|
|
"full_name": "bytecaps\/CVE-2022-1388-EXP",
|
|
"owner": {
|
|
"login": "bytecaps",
|
|
"id": 52679771,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/52679771?v=4",
|
|
"html_url": "https:\/\/github.com\/bytecaps"
|
|
},
|
|
"html_url": "https:\/\/github.com\/bytecaps\/CVE-2022-1388-EXP",
|
|
"description": "CVE-2022-1388 F5 BIG-IP RCE 批量检测",
|
|
"fork": false,
|
|
"created_at": "2022-05-07T17:54:08Z",
|
|
"updated_at": "2022-05-09T23:54:53Z",
|
|
"pushed_at": "2022-05-09T11:15:27Z",
|
|
"stargazers_count": 34,
|
|
"watchers_count": 34,
|
|
"forks_count": 11,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 11,
|
|
"watchers": 34,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 490120378,
|
|
"name": "CVE-2022-1388",
|
|
"full_name": "Hudi233\/CVE-2022-1388",
|
|
"owner": {
|
|
"login": "Hudi233",
|
|
"id": 20939673,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20939673?v=4",
|
|
"html_url": "https:\/\/github.com\/Hudi233"
|
|
},
|
|
"html_url": "https:\/\/github.com\/Hudi233\/CVE-2022-1388",
|
|
"description": null,
|
|
"fork": false,
|
|
"created_at": "2022-05-09T03:20:46Z",
|
|
"updated_at": "2022-05-09T03:30:48Z",
|
|
"pushed_at": "2022-05-09T03:35:31Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 490182003,
|
|
"name": "CVE-2022-1388_F5_BIG-IP_RCE",
|
|
"full_name": "sherlocksecurity\/CVE-2022-1388_F5_BIG-IP_RCE",
|
|
"owner": {
|
|
"login": "sherlocksecurity",
|
|
"id": 52328067,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/52328067?v=4",
|
|
"html_url": "https:\/\/github.com\/sherlocksecurity"
|
|
},
|
|
"html_url": "https:\/\/github.com\/sherlocksecurity\/CVE-2022-1388_F5_BIG-IP_RCE",
|
|
"description": "PoC for CVE-2022-1388_F5_BIG-IP",
|
|
"fork": false,
|
|
"created_at": "2022-05-09T07:39:55Z",
|
|
"updated_at": "2022-05-09T23:48:49Z",
|
|
"pushed_at": "2022-05-09T10:23:11Z",
|
|
"stargazers_count": 24,
|
|
"watchers_count": 24,
|
|
"forks_count": 6,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 6,
|
|
"watchers": 24,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 490229104,
|
|
"name": "CVE-2022-1388",
|
|
"full_name": "yukar1z0e\/CVE-2022-1388",
|
|
"owner": {
|
|
"login": "yukar1z0e",
|
|
"id": 44317939,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44317939?v=4",
|
|
"html_url": "https:\/\/github.com\/yukar1z0e"
|
|
},
|
|
"html_url": "https:\/\/github.com\/yukar1z0e\/CVE-2022-1388",
|
|
"description": "batch scan CVE-2022-1388",
|
|
"fork": false,
|
|
"created_at": "2022-05-09T10:06:11Z",
|
|
"updated_at": "2022-05-09T15:40:02Z",
|
|
"pushed_at": "2022-05-09T10:07:45Z",
|
|
"stargazers_count": 2,
|
|
"watchers_count": 2,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 2,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 490234251,
|
|
"name": "CVE-2022-1388",
|
|
"full_name": "0xf4n9x\/CVE-2022-1388",
|
|
"owner": {
|
|
"login": "0xf4n9x",
|
|
"id": 40891670,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/40891670?v=4",
|
|
"html_url": "https:\/\/github.com\/0xf4n9x"
|
|
},
|
|
"html_url": "https:\/\/github.com\/0xf4n9x\/CVE-2022-1388",
|
|
"description": "CVE-2022-1388 F5 BIG-IP iControl REST Auth Bypass RCE",
|
|
"fork": false,
|
|
"created_at": "2022-05-09T10:22:31Z",
|
|
"updated_at": "2022-05-10T00:08:11Z",
|
|
"pushed_at": "2022-05-09T12:02:39Z",
|
|
"stargazers_count": 18,
|
|
"watchers_count": 18,
|
|
"forks_count": 2,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 2,
|
|
"watchers": 18,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 490237968,
|
|
"name": "CVE-2022-1388_PoC",
|
|
"full_name": "alt3kx\/CVE-2022-1388_PoC",
|
|
"owner": {
|
|
"login": "alt3kx",
|
|
"id": 3140111,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3140111?v=4",
|
|
"html_url": "https:\/\/github.com\/alt3kx"
|
|
},
|
|
"html_url": "https:\/\/github.com\/alt3kx\/CVE-2022-1388_PoC",
|
|
"description": "F5 BIG-IP RCE exploitation (CVE-2022-1388)",
|
|
"fork": false,
|
|
"created_at": "2022-05-09T10:34:38Z",
|
|
"updated_at": "2022-05-09T23:11:55Z",
|
|
"pushed_at": "2022-05-09T22:15:58Z",
|
|
"stargazers_count": 24,
|
|
"watchers_count": 24,
|
|
"forks_count": 3,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 3,
|
|
"watchers": 24,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 490241404,
|
|
"name": "F5-Big-IP-CVE-2022-1388",
|
|
"full_name": "Vulnmachines\/F5-Big-IP-CVE-2022-1388",
|
|
"owner": {
|
|
"login": "Vulnmachines",
|
|
"id": 79006904,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/79006904?v=4",
|
|
"html_url": "https:\/\/github.com\/Vulnmachines"
|
|
},
|
|
"html_url": "https:\/\/github.com\/Vulnmachines\/F5-Big-IP-CVE-2022-1388",
|
|
"description": "CVE-2022-1388 F5 Big IP unauth remote code execution",
|
|
"fork": false,
|
|
"created_at": "2022-05-09T10:46:19Z",
|
|
"updated_at": "2022-05-09T13:47:31Z",
|
|
"pushed_at": "2022-05-09T11:04:58Z",
|
|
"stargazers_count": 1,
|
|
"watchers_count": 1,
|
|
"forks_count": 1,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 1,
|
|
"watchers": 1,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 490254474,
|
|
"name": "F5-CVE-2022-1388-Exploit",
|
|
"full_name": "ZephrFish\/F5-CVE-2022-1388-Exploit",
|
|
"owner": {
|
|
"login": "ZephrFish",
|
|
"id": 5783068,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5783068?v=4",
|
|
"html_url": "https:\/\/github.com\/ZephrFish"
|
|
},
|
|
"html_url": "https:\/\/github.com\/ZephrFish\/F5-CVE-2022-1388-Exploit",
|
|
"description": "Exploit and Check Script for CVE 2022-1388",
|
|
"fork": false,
|
|
"created_at": "2022-05-09T11:30:09Z",
|
|
"updated_at": "2022-05-10T00:13:17Z",
|
|
"pushed_at": "2022-05-09T17:58:13Z",
|
|
"stargazers_count": 12,
|
|
"watchers_count": 12,
|
|
"forks_count": 4,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 4,
|
|
"watchers": 12,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 490259731,
|
|
"name": "CVE-2022-1388",
|
|
"full_name": "horizon3ai\/CVE-2022-1388",
|
|
"owner": {
|
|
"login": "horizon3ai",
|
|
"id": 79593994,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/79593994?v=4",
|
|
"html_url": "https:\/\/github.com\/horizon3ai"
|
|
},
|
|
"html_url": "https:\/\/github.com\/horizon3ai\/CVE-2022-1388",
|
|
"description": "POC for CVE-2022-1388",
|
|
"fork": false,
|
|
"created_at": "2022-05-09T11:46:45Z",
|
|
"updated_at": "2022-05-09T23:58:31Z",
|
|
"pushed_at": "2022-05-09T20:52:07Z",
|
|
"stargazers_count": 40,
|
|
"watchers_count": 40,
|
|
"forks_count": 11,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 11,
|
|
"watchers": 40,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 490263535,
|
|
"name": "CVE-2022-1388",
|
|
"full_name": "crowsec-edtech\/CVE-2022-1388",
|
|
"owner": {
|
|
"login": "crowsec-edtech",
|
|
"id": 97851186,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/97851186?v=4",
|
|
"html_url": "https:\/\/github.com\/crowsec-edtech"
|
|
},
|
|
"html_url": "https:\/\/github.com\/crowsec-edtech\/CVE-2022-1388",
|
|
"description": "Poc Exploit for BIG-IP Pre-Auth RCE - CVE-2022-1388",
|
|
"fork": false,
|
|
"created_at": "2022-05-09T11:58:37Z",
|
|
"updated_at": "2022-05-09T14:04:06Z",
|
|
"pushed_at": "2022-05-09T11:58:37Z",
|
|
"stargazers_count": 2,
|
|
"watchers_count": 2,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 2,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 490307613,
|
|
"name": "CVE-2022-1388",
|
|
"full_name": "Al1ex\/CVE-2022-1388",
|
|
"owner": {
|
|
"login": "Al1ex",
|
|
"id": 38161463,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38161463?v=4",
|
|
"html_url": "https:\/\/github.com\/Al1ex"
|
|
},
|
|
"html_url": "https:\/\/github.com\/Al1ex\/CVE-2022-1388",
|
|
"description": "CVE-2022-1388 F5 BIG-IP iControl REST RCE",
|
|
"fork": false,
|
|
"created_at": "2022-05-09T14:01:38Z",
|
|
"updated_at": "2022-05-09T18:31:17Z",
|
|
"pushed_at": "2022-05-09T14:20:40Z",
|
|
"stargazers_count": 4,
|
|
"watchers_count": 4,
|
|
"forks_count": 1,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"topics": [
|
|
"cve-2022-1388",
|
|
"f5-big-ip-icontrol-rest-rce"
|
|
],
|
|
"visibility": "public",
|
|
"forks": 1,
|
|
"watchers": 4,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 490307975,
|
|
"name": "CVE-2022-1388",
|
|
"full_name": "Henry4E36\/CVE-2022-1388",
|
|
"owner": {
|
|
"login": "Henry4E36",
|
|
"id": 41940481,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/41940481?v=4",
|
|
"html_url": "https:\/\/github.com\/Henry4E36"
|
|
},
|
|
"html_url": "https:\/\/github.com\/Henry4E36\/CVE-2022-1388",
|
|
"description": "F5 BIG-IP iControl REST身份验证绕过漏洞",
|
|
"fork": false,
|
|
"created_at": "2022-05-09T14:02:34Z",
|
|
"updated_at": "2022-05-09T14:37:25Z",
|
|
"pushed_at": "2022-05-09T14:06:50Z",
|
|
"stargazers_count": 1,
|
|
"watchers_count": 1,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 1,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 490310601,
|
|
"name": "F5-BIG-IP-RCE-CVE-2022-1388",
|
|
"full_name": "Angus-Team\/F5-BIG-IP-RCE-CVE-2022-1388",
|
|
"owner": {
|
|
"login": "Angus-Team",
|
|
"id": 103045627,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/103045627?v=4",
|
|
"html_url": "https:\/\/github.com\/Angus-Team"
|
|
},
|
|
"html_url": "https:\/\/github.com\/Angus-Team\/F5-BIG-IP-RCE-CVE-2022-1388",
|
|
"description": "多线程检测CVE-2022-1388",
|
|
"fork": false,
|
|
"created_at": "2022-05-09T14:09:34Z",
|
|
"updated_at": "2022-05-09T15:27:25Z",
|
|
"pushed_at": "2022-05-09T15:25:52Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 490310701,
|
|
"name": "CVE-2022-1388-mass",
|
|
"full_name": "cve-hunter\/CVE-2022-1388-mass",
|
|
"owner": {
|
|
"login": "cve-hunter",
|
|
"id": 104981226,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/104981226?v=4",
|
|
"html_url": "https:\/\/github.com\/cve-hunter"
|
|
},
|
|
"html_url": "https:\/\/github.com\/cve-hunter\/CVE-2022-1388-mass",
|
|
"description": null,
|
|
"fork": false,
|
|
"created_at": "2022-05-09T14:09:49Z",
|
|
"updated_at": "2022-05-09T14:24:04Z",
|
|
"pushed_at": "2022-05-09T14:25:24Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 490321219,
|
|
"name": "CVE-2022-1388",
|
|
"full_name": "savior-only\/CVE-2022-1388",
|
|
"owner": {
|
|
"login": "savior-only",
|
|
"id": 69495405,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/69495405?v=4",
|
|
"html_url": "https:\/\/github.com\/savior-only"
|
|
},
|
|
"html_url": "https:\/\/github.com\/savior-only\/CVE-2022-1388",
|
|
"description": "CVE-2022-1388 F5 BIG-IP iControl REST身份验证绕过漏洞",
|
|
"fork": false,
|
|
"created_at": "2022-05-09T14:37:04Z",
|
|
"updated_at": "2022-05-09T14:39:16Z",
|
|
"pushed_at": "2022-05-09T14:37:57Z",
|
|
"stargazers_count": 2,
|
|
"watchers_count": 2,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 2,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 490339060,
|
|
"name": "CVE-2022-1388",
|
|
"full_name": "saucer-man\/CVE-2022-1388",
|
|
"owner": {
|
|
"login": "saucer-man",
|
|
"id": 32133080,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/32133080?v=4",
|
|
"html_url": "https:\/\/github.com\/saucer-man"
|
|
},
|
|
"html_url": "https:\/\/github.com\/saucer-man\/CVE-2022-1388",
|
|
"description": "CVE-2022-1388",
|
|
"fork": false,
|
|
"created_at": "2022-05-09T15:24:27Z",
|
|
"updated_at": "2022-05-09T16:10:58Z",
|
|
"pushed_at": "2022-05-09T16:14:49Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 490345813,
|
|
"name": "CVE-2022-1388",
|
|
"full_name": "superzerosec\/CVE-2022-1388",
|
|
"owner": {
|
|
"login": "superzerosec",
|
|
"id": 57648217,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57648217?v=4",
|
|
"html_url": "https:\/\/github.com\/superzerosec"
|
|
},
|
|
"html_url": "https:\/\/github.com\/superzerosec\/CVE-2022-1388",
|
|
"description": "CVE-2022-1388 POC exploit",
|
|
"fork": false,
|
|
"created_at": "2022-05-09T15:42:55Z",
|
|
"updated_at": "2022-05-09T16:22:23Z",
|
|
"pushed_at": "2022-05-09T16:51:24Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 490383212,
|
|
"name": "CVE-2022-1388-RCE-checker",
|
|
"full_name": "trhacknon\/CVE-2022-1388-RCE-checker",
|
|
"owner": {
|
|
"login": "trhacknon",
|
|
"id": 98242014,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/98242014?v=4",
|
|
"html_url": "https:\/\/github.com\/trhacknon"
|
|
},
|
|
"html_url": "https:\/\/github.com\/trhacknon\/CVE-2022-1388-RCE-checker",
|
|
"description": null,
|
|
"fork": false,
|
|
"created_at": "2022-05-09T17:34:28Z",
|
|
"updated_at": "2022-05-09T17:34:39Z",
|
|
"pushed_at": "2022-05-09T17:34:36Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0
|
|
}
|
|
] |