PoC-in-GitHub/2020/CVE-2020-5902.json
2024-12-28 03:31:15 +09:00

460 lines
No EOL
16 KiB
JSON
Raw Blame History

This file contains invisible Unicode characters

This file contains invisible Unicode characters that are indistinguishable to humans but may be processed differently by a computer. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

[
{
"id": 277243283,
"name": "CVE-2020-5902-Scanner",
"full_name": "aqhmal\/CVE-2020-5902-Scanner",
"owner": {
"login": "aqhmal",
"id": 22043590,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22043590?v=4",
"html_url": "https:\/\/github.com\/aqhmal",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/aqhmal\/CVE-2020-5902-Scanner",
"description": "Automated script for F5 BIG-IP scanner (CVE-2020-5902) using hosts retrieved from Shodan API.",
"fork": false,
"created_at": "2020-07-05T06:19:09Z",
"updated_at": "2024-08-12T20:03:23Z",
"pushed_at": "2022-12-08T11:03:15Z",
"stargazers_count": 55,
"watchers_count": 55,
"has_discussions": false,
"forks_count": 22,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"bigip",
"f5-bigip",
"f5networks",
"python3",
"shodan-python"
],
"visibility": "public",
"forks": 22,
"watchers": 55,
"score": 0,
"subscribers_count": 3
},
{
"id": 277342661,
"name": "CVE-2020-5902",
"full_name": "jas502n\/CVE-2020-5902",
"owner": {
"login": "jas502n",
"id": 16593068,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16593068?v=4",
"html_url": "https:\/\/github.com\/jas502n",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/jas502n\/CVE-2020-5902",
"description": "CVE-2020-5902 BIG-IP",
"fork": false,
"created_at": "2020-07-05T16:38:32Z",
"updated_at": "2024-12-15T01:46:03Z",
"pushed_at": "2021-10-13T07:53:46Z",
"stargazers_count": 371,
"watchers_count": 371,
"has_discussions": false,
"forks_count": 112,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 112,
"watchers": 371,
"score": 0,
"subscribers_count": 9
},
{
"id": 277412358,
"name": "CVE-2020-5902",
"full_name": "yasserjanah\/CVE-2020-5902",
"owner": {
"login": "yasserjanah",
"id": 20858378,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20858378?v=4",
"html_url": "https:\/\/github.com\/yasserjanah",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/yasserjanah\/CVE-2020-5902",
"description": "exploit code for F5-Big-IP (CVE-2020-5902)",
"fork": false,
"created_at": "2020-07-06T01:12:23Z",
"updated_at": "2024-08-12T20:03:25Z",
"pushed_at": "2023-05-22T23:32:39Z",
"stargazers_count": 43,
"watchers_count": 43,
"has_discussions": false,
"forks_count": 14,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve-2020-5902",
"exploits",
"f5-bigip",
"hacking-tool",
"python",
"rce"
],
"visibility": "public",
"forks": 14,
"watchers": 43,
"score": 0,
"subscribers_count": 2
},
{
"id": 277438754,
"name": "CVE-2020-5902",
"full_name": "dunderhay\/CVE-2020-5902",
"owner": {
"login": "dunderhay",
"id": 27876907,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/27876907?v=4",
"html_url": "https:\/\/github.com\/dunderhay",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/dunderhay\/CVE-2020-5902",
"description": "Python script to exploit F5 Big-IP CVE-2020-5902 ",
"fork": false,
"created_at": "2020-07-06T04:03:58Z",
"updated_at": "2024-10-21T11:23:55Z",
"pushed_at": "2024-03-19T01:21:06Z",
"stargazers_count": 37,
"watchers_count": 37,
"has_discussions": false,
"forks_count": 8,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 8,
"watchers": 37,
"score": 0,
"subscribers_count": 2
},
{
"id": 277851560,
"name": "f5_scanner",
"full_name": "cristiano-corrado\/f5_scanner",
"owner": {
"login": "cristiano-corrado",
"id": 3243602,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3243602?v=4",
"html_url": "https:\/\/github.com\/cristiano-corrado",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/cristiano-corrado\/f5_scanner",
"description": "F5 mass scanner and CVE-2020-5902 checker",
"fork": false,
"created_at": "2020-07-07T15:17:13Z",
"updated_at": "2024-03-22T14:32:41Z",
"pushed_at": "2024-06-17T23:33:55Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 283054636,
"name": "CVE-2020-5902-F5BigIP",
"full_name": "corelight\/CVE-2020-5902-F5BigIP",
"owner": {
"login": "corelight",
"id": 21672558,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/21672558?v=4",
"html_url": "https:\/\/github.com\/corelight",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/corelight\/CVE-2020-5902-F5BigIP",
"description": "A network detection package for CVE-2020-5902, a CVE10.0 vulnerability affecting F5 Networks, Inc BIG-IP devices.",
"fork": false,
"created_at": "2020-07-28T00:43:14Z",
"updated_at": "2024-08-12T20:04:12Z",
"pushed_at": "2020-11-12T06:17:02Z",
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 4,
"score": 0,
"subscribers_count": 12
},
{
"id": 286226256,
"name": "CVE-2020-5902-Scanner",
"full_name": "PushpenderIndia\/CVE-2020-5902-Scanner",
"owner": {
"login": "PushpenderIndia",
"id": 56433698,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/56433698?v=4",
"html_url": "https:\/\/github.com\/PushpenderIndia",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/PushpenderIndia\/CVE-2020-5902-Scanner",
"description": "Automated F5 Big IP Remote Code Execution (CVE-2020-5902) Scanner Written In Python 3",
"fork": false,
"created_at": "2020-08-09T11:46:23Z",
"updated_at": "2024-08-12T20:04:33Z",
"pushed_at": "2021-12-17T11:40:03Z",
"stargazers_count": 13,
"watchers_count": 13,
"has_discussions": false,
"forks_count": 7,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 7,
"watchers": 13,
"score": 0,
"subscribers_count": 1
},
{
"id": 294219427,
"name": "BIG-IP-F5-TMUI-RCE-Vulnerability",
"full_name": "ludy-dev\/BIG-IP-F5-TMUI-RCE-Vulnerability",
"owner": {
"login": "ludy-dev",
"id": 70466565,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/70466565?v=4",
"html_url": "https:\/\/github.com\/ludy-dev",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/ludy-dev\/BIG-IP-F5-TMUI-RCE-Vulnerability",
"description": "(CVE-2020-5902) BIG IP F5 TMUI RCE Vulnerability RCE PoC\/ Test Script ",
"fork": false,
"created_at": "2020-09-09T20:15:03Z",
"updated_at": "2020-11-07T10:08:19Z",
"pushed_at": "2020-11-07T10:08:17Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 336016319,
"name": "F5-BIG-IP-CVE-2020-5902-shodan-scanner",
"full_name": "faisalfs10x\/F5-BIG-IP-CVE-2020-5902-shodan-scanner",
"owner": {
"login": "faisalfs10x",
"id": 51811615,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51811615?v=4",
"html_url": "https:\/\/github.com\/faisalfs10x",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/faisalfs10x\/F5-BIG-IP-CVE-2020-5902-shodan-scanner",
"description": "simple bash script of F5 BIG-IP TMUI Vulnerability CVE-2020-5902 checker",
"fork": false,
"created_at": "2021-02-04T16:36:21Z",
"updated_at": "2023-04-22T21:33:25Z",
"pushed_at": "2021-02-04T17:38:40Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"bigip",
"cve-2020-5902",
"exploit",
"poc"
],
"visibility": "public",
"forks": 1,
"watchers": 1,
"score": 0,
"subscribers_count": 2
},
{
"id": 357452088,
"name": "CVE-2020-5902",
"full_name": "haisenberg\/CVE-2020-5902",
"owner": {
"login": "haisenberg",
"id": 64567828,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/64567828?v=4",
"html_url": "https:\/\/github.com\/haisenberg",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/haisenberg\/CVE-2020-5902",
"description": "Auto exploit RCE CVE-2020-5902 ",
"fork": false,
"created_at": "2021-04-13T06:48:20Z",
"updated_at": "2024-08-12T20:12:06Z",
"pushed_at": "2021-04-13T21:13:23Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 497326298,
"name": "F5-BIG-IP-POC",
"full_name": "west9b\/F5-BIG-IP-POC",
"owner": {
"login": "west9b",
"id": 103512651,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/103512651?v=4",
"html_url": "https:\/\/github.com\/west9b",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/west9b\/F5-BIG-IP-POC",
"description": "CVE-2020-5902 CVE-2021-22986 CVE-2022-1388 POC集合",
"fork": false,
"created_at": "2022-05-28T13:30:22Z",
"updated_at": "2023-09-13T08:48:13Z",
"pushed_at": "2022-07-30T00:16:29Z",
"stargazers_count": 11,
"watchers_count": 11,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 11,
"score": 0,
"subscribers_count": 2
},
{
"id": 511566999,
"name": "CVE-2020-5902",
"full_name": "z3n70\/CVE-2020-5902",
"owner": {
"login": "z3n70",
"id": 39817707,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/39817707?v=4",
"html_url": "https:\/\/github.com\/z3n70",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/z3n70\/CVE-2020-5902",
"description": "BIGIP CVE-2020-5902 Exploit POC and automation scanning vulnerability",
"fork": false,
"created_at": "2022-07-07T14:48:08Z",
"updated_at": "2024-07-09T19:48:21Z",
"pushed_at": "2022-07-07T15:01:58Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"bigip",
"bugbounty",
"cve",
"cybersecurity",
"vulnerability"
],
"visibility": "public",
"forks": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 1
},
{
"id": 577662602,
"name": "APT-Backpack",
"full_name": "34zY\/APT-Backpack",
"owner": {
"login": "34zY",
"id": 55347142,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/55347142?v=4",
"html_url": "https:\/\/github.com\/34zY",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/34zY\/APT-Backpack",
"description": "cve-2019-11510, cve-2019-19781, cve-2020-5902,               cve-2021-1497, cve-2021-20090, cve-2021-22006, cve-2021-22205, cve-2021-26084, cve-2021-26855, cve-2021-26857, cve-202126857, cve-202126858, cve-202126865",
"fork": false,
"created_at": "2022-12-13T08:41:44Z",
"updated_at": "2024-11-05T01:37:50Z",
"pushed_at": "2023-04-19T17:10:15Z",
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 3,
"score": 0,
"subscribers_count": 1
},
{
"id": 598558288,
"name": "CVE-2020-5902",
"full_name": "amitlttwo\/CVE-2020-5902",
"owner": {
"login": "amitlttwo",
"id": 55759090,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/55759090?v=4",
"html_url": "https:\/\/github.com\/amitlttwo",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/amitlttwo\/CVE-2020-5902",
"description": "In BIG-IP versions 15.0.0-15.1.0.3, 14.1.0-14.1.2.5, 13.1.0-13.1.3.3, 12.1.0-12.1.5.1, and 11.6.1-11.6.5.1, the Traffic Management User Interface (TMUI), also referred to as the Configuration utility, has a Remote Code Execution (RCE) vulnerability in undisclosed pages.",
"fork": false,
"created_at": "2023-02-07T11:07:23Z",
"updated_at": "2024-07-09T19:48:49Z",
"pushed_at": "2023-02-07T11:12:31Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
}
]