272 lines
No EOL
9.8 KiB
JSON
272 lines
No EOL
9.8 KiB
JSON
[
|
||
{
|
||
"name": "CVE-2020-5902",
|
||
"full_name": "jas502n/CVE-2020-5902",
|
||
"html_url": "https://github.com/jas502n/CVE-2020-5902",
|
||
"description": "CVE-2020-5902 BIG-IP",
|
||
"stargazers_count": 373,
|
||
"forks_count": 112,
|
||
"created_at": "2020-07-05T16:38:32Z"
|
||
},
|
||
{
|
||
"name": "CVE-2020-5902",
|
||
"full_name": "yassineaboukir/CVE-2020-5902",
|
||
"html_url": "https://github.com/yassineaboukir/CVE-2020-5902",
|
||
"description": "Proof of concept for CVE-2020-5902",
|
||
"stargazers_count": 72,
|
||
"forks_count": 25,
|
||
"created_at": "2020-07-05T17:01:27Z"
|
||
},
|
||
{
|
||
"name": "f5-bigip-rce-cve-2020-5902",
|
||
"full_name": "theLSA/f5-bigip-rce-cve-2020-5902",
|
||
"html_url": "https://github.com/theLSA/f5-bigip-rce-cve-2020-5902",
|
||
"description": "F5 BIG-IP RCE CVE-2020-5902 automatic check tool",
|
||
"stargazers_count": 62,
|
||
"forks_count": 17,
|
||
"created_at": "2020-07-10T15:33:00Z"
|
||
},
|
||
{
|
||
"name": "CVE-2020-5902-Scanner",
|
||
"full_name": "aqhmal/CVE-2020-5902-Scanner",
|
||
"html_url": "https://github.com/aqhmal/CVE-2020-5902-Scanner",
|
||
"description": "Automated script for F5 BIG-IP scanner (CVE-2020-5902) using hosts retrieved from Shodan API.",
|
||
"stargazers_count": 55,
|
||
"forks_count": 22,
|
||
"created_at": "2020-07-05T06:19:09Z"
|
||
},
|
||
{
|
||
"name": "CVE-2020-5902",
|
||
"full_name": "yasserjanah/CVE-2020-5902",
|
||
"html_url": "https://github.com/yasserjanah/CVE-2020-5902",
|
||
"description": "exploit code for F5-Big-IP (CVE-2020-5902)",
|
||
"stargazers_count": 43,
|
||
"forks_count": 14,
|
||
"created_at": "2020-07-06T01:12:23Z"
|
||
},
|
||
{
|
||
"name": "CVE-2020-5902",
|
||
"full_name": "dunderhay/CVE-2020-5902",
|
||
"html_url": "https://github.com/dunderhay/CVE-2020-5902",
|
||
"description": "Python script to exploit F5 Big-IP CVE-2020-5902 ",
|
||
"stargazers_count": 37,
|
||
"forks_count": 8,
|
||
"created_at": "2020-07-06T04:03:58Z"
|
||
},
|
||
{
|
||
"name": "cve-2020-5902-ioc-bigip-checker",
|
||
"full_name": "f5devcentral/cve-2020-5902-ioc-bigip-checker",
|
||
"html_url": "https://github.com/f5devcentral/cve-2020-5902-ioc-bigip-checker",
|
||
"description": null,
|
||
"stargazers_count": 17,
|
||
"forks_count": 12,
|
||
"created_at": "2020-07-20T19:10:09Z"
|
||
},
|
||
{
|
||
"name": "CVE-2020-5902",
|
||
"full_name": "zhzyker/CVE-2020-5902",
|
||
"html_url": "https://github.com/zhzyker/CVE-2020-5902",
|
||
"description": "F5 BIG-IP 任意文件读取+远程命令执行RCE",
|
||
"stargazers_count": 13,
|
||
"forks_count": 8,
|
||
"created_at": "2020-07-08T04:02:07Z"
|
||
},
|
||
{
|
||
"name": "CVE-2020-5902-Scanner",
|
||
"full_name": "PushpenderIndia/CVE-2020-5902-Scanner",
|
||
"html_url": "https://github.com/PushpenderIndia/CVE-2020-5902-Scanner",
|
||
"description": "Automated F5 Big IP Remote Code Execution (CVE-2020-5902) Scanner Written In Python 3",
|
||
"stargazers_count": 13,
|
||
"forks_count": 7,
|
||
"created_at": "2020-08-09T11:46:23Z"
|
||
},
|
||
{
|
||
"name": "CVE-2020-5902",
|
||
"full_name": "ar0dd/CVE-2020-5902",
|
||
"html_url": "https://github.com/ar0dd/CVE-2020-5902",
|
||
"description": "POC code for checking for this vulnerability. Since the code has been released, I decided to release this one as well. Patch Immediately!",
|
||
"stargazers_count": 12,
|
||
"forks_count": 2,
|
||
"created_at": "2020-07-05T16:38:36Z"
|
||
},
|
||
{
|
||
"name": "CVE-2020-5902-POC-EXP",
|
||
"full_name": "lijiaxing1997/CVE-2020-5902-POC-EXP",
|
||
"html_url": "https://github.com/lijiaxing1997/CVE-2020-5902-POC-EXP",
|
||
"description": "批量扫描CVE-2020-5902,远程代码执行,已测试",
|
||
"stargazers_count": 10,
|
||
"forks_count": 8,
|
||
"created_at": "2020-07-06T09:16:36Z"
|
||
},
|
||
{
|
||
"name": "CVE-2020-5902",
|
||
"full_name": "Al1ex/CVE-2020-5902",
|
||
"html_url": "https://github.com/Al1ex/CVE-2020-5902",
|
||
"description": "CVE-2020-5902",
|
||
"stargazers_count": 10,
|
||
"forks_count": 3,
|
||
"created_at": "2020-07-11T14:01:08Z"
|
||
},
|
||
{
|
||
"name": "CVE-2020-5902",
|
||
"full_name": "dwisiswant0/CVE-2020-5902",
|
||
"html_url": "https://github.com/dwisiswant0/CVE-2020-5902",
|
||
"description": "CVE-2020-5902",
|
||
"stargazers_count": 9,
|
||
"forks_count": 2,
|
||
"created_at": "2020-07-04T14:12:57Z"
|
||
},
|
||
{
|
||
"name": "CVE-2020-5902",
|
||
"full_name": "nsflabs/CVE-2020-5902",
|
||
"html_url": "https://github.com/nsflabs/CVE-2020-5902",
|
||
"description": null,
|
||
"stargazers_count": 8,
|
||
"forks_count": 10,
|
||
"created_at": "2020-07-05T20:16:07Z"
|
||
},
|
||
{
|
||
"name": "CVE-2020-5902_RCE",
|
||
"full_name": "sv3nbeast/CVE-2020-5902_RCE",
|
||
"html_url": "https://github.com/sv3nbeast/CVE-2020-5902_RCE",
|
||
"description": null,
|
||
"stargazers_count": 8,
|
||
"forks_count": 3,
|
||
"created_at": "2020-07-06T06:45:21Z"
|
||
},
|
||
{
|
||
"name": "CVE-2020-5902-NSE",
|
||
"full_name": "rwincey/CVE-2020-5902-NSE",
|
||
"html_url": "https://github.com/rwincey/CVE-2020-5902-NSE",
|
||
"description": null,
|
||
"stargazers_count": 8,
|
||
"forks_count": 2,
|
||
"created_at": "2020-07-05T17:51:38Z"
|
||
},
|
||
{
|
||
"name": "CVE-2020-5902-rce-gui",
|
||
"full_name": "rockmelodies/CVE-2020-5902-rce-gui",
|
||
"html_url": "https://github.com/rockmelodies/CVE-2020-5902-rce-gui",
|
||
"description": "GUI",
|
||
"stargazers_count": 8,
|
||
"forks_count": 1,
|
||
"created_at": "2020-07-17T03:13:30Z"
|
||
},
|
||
{
|
||
"name": "CVE-2020-5902",
|
||
"full_name": "jiansiting/CVE-2020-5902",
|
||
"html_url": "https://github.com/jiansiting/CVE-2020-5902",
|
||
"description": "F5 BIG-IP Scanner (CVE-2020-5902)",
|
||
"stargazers_count": 5,
|
||
"forks_count": 5,
|
||
"created_at": "2020-07-07T02:03:39Z"
|
||
},
|
||
{
|
||
"name": "checker-CVE-2020-5902",
|
||
"full_name": "MrCl0wnLab/checker-CVE-2020-5902",
|
||
"html_url": "https://github.com/MrCl0wnLab/checker-CVE-2020-5902",
|
||
"description": "Checker CVE-2020-5902: BIG-IP versions 15.0.0 through 15.1.0.3, 14.1.0 through 14.1.2.5, 13.1.0 through 13.1.3.3, 12.1.0 through 12.1.5.1, and 11.6.1 through 11.6.5.1 suffer from Traffic Management User Interface (TMUI) arbitrary file read and command execution vulnerabilities.",
|
||
"stargazers_count": 5,
|
||
"forks_count": 5,
|
||
"created_at": "2020-07-10T07:00:35Z"
|
||
},
|
||
{
|
||
"name": "F5-Big-IP-CVE-2020-5902-mass-exploiter",
|
||
"full_name": "d4rk007/F5-Big-IP-CVE-2020-5902-mass-exploiter",
|
||
"html_url": "https://github.com/d4rk007/F5-Big-IP-CVE-2020-5902-mass-exploiter",
|
||
"description": "F5 Big-IP CVE-2020-5902 mass exploiter/fuzzer.",
|
||
"stargazers_count": 4,
|
||
"forks_count": 6,
|
||
"created_at": "2020-07-09T08:34:37Z"
|
||
},
|
||
{
|
||
"name": "CVE-2020-5902-F5BigIP",
|
||
"full_name": "corelight/CVE-2020-5902-F5BigIP",
|
||
"html_url": "https://github.com/corelight/CVE-2020-5902-F5BigIP",
|
||
"description": "A network detection package for CVE-2020-5902, a CVE10.0 vulnerability affecting F5 Networks, Inc BIG-IP devices.",
|
||
"stargazers_count": 4,
|
||
"forks_count": 4,
|
||
"created_at": "2020-07-28T00:43:14Z"
|
||
},
|
||
{
|
||
"name": "cve-2020-5902",
|
||
"full_name": "r0ttenbeef/cve-2020-5902",
|
||
"html_url": "https://github.com/r0ttenbeef/cve-2020-5902",
|
||
"description": "cve-2020-5902 POC exploit",
|
||
"stargazers_count": 3,
|
||
"forks_count": 0,
|
||
"created_at": "2020-07-06T05:11:37Z"
|
||
},
|
||
{
|
||
"name": "GoF5-CVE-2020-5902",
|
||
"full_name": "deepsecurity-pe/GoF5-CVE-2020-5902",
|
||
"html_url": "https://github.com/deepsecurity-pe/GoF5-CVE-2020-5902",
|
||
"description": "Script para validar CVE-2020-5902 hecho en Go.",
|
||
"stargazers_count": 2,
|
||
"forks_count": 2,
|
||
"created_at": "2020-07-09T06:09:39Z"
|
||
},
|
||
{
|
||
"name": "CVE-2020-5902",
|
||
"full_name": "murataydemir/CVE-2020-5902",
|
||
"html_url": "https://github.com/murataydemir/CVE-2020-5902",
|
||
"description": "[CVE-2020-5902] F5 BIG-IP Remote Code Execution (RCE)",
|
||
"stargazers_count": 2,
|
||
"forks_count": 1,
|
||
"created_at": "2020-08-13T08:27:25Z"
|
||
},
|
||
{
|
||
"name": "CVE-2020-5902",
|
||
"full_name": "z3n70/CVE-2020-5902",
|
||
"html_url": "https://github.com/z3n70/CVE-2020-5902",
|
||
"description": "BIGIP CVE-2020-5902 Exploit POC and automation scanning vulnerability",
|
||
"stargazers_count": 2,
|
||
"forks_count": 1,
|
||
"created_at": "2022-07-07T14:48:08Z"
|
||
},
|
||
{
|
||
"name": "scanner-CVE-2020-5902",
|
||
"full_name": "cybersecurityworks553/scanner-CVE-2020-5902",
|
||
"html_url": "https://github.com/cybersecurityworks553/scanner-CVE-2020-5902",
|
||
"description": "CVE-2020-5902 scanner",
|
||
"stargazers_count": 2,
|
||
"forks_count": 1,
|
||
"created_at": "2020-07-06T06:58:29Z"
|
||
},
|
||
{
|
||
"name": "F5-BIG-IP-CVE-2020-5902-shodan-scanner",
|
||
"full_name": "faisalfs10x/F5-BIG-IP-CVE-2020-5902-shodan-scanner",
|
||
"html_url": "https://github.com/faisalfs10x/F5-BIG-IP-CVE-2020-5902-shodan-scanner",
|
||
"description": "simple bash script of F5 BIG-IP TMUI Vulnerability CVE-2020-5902 checker",
|
||
"stargazers_count": 1,
|
||
"forks_count": 1,
|
||
"created_at": "2021-02-04T16:36:21Z"
|
||
},
|
||
{
|
||
"name": "CVE-2020-5902",
|
||
"full_name": "haisenberg/CVE-2020-5902",
|
||
"html_url": "https://github.com/haisenberg/CVE-2020-5902",
|
||
"description": "Auto exploit RCE CVE-2020-5902 ",
|
||
"stargazers_count": 1,
|
||
"forks_count": 2,
|
||
"created_at": "2021-04-13T06:48:20Z"
|
||
},
|
||
{
|
||
"name": "CVE-2020-5902",
|
||
"full_name": "0xAbdullah/CVE-2020-5902",
|
||
"html_url": "https://github.com/0xAbdullah/CVE-2020-5902",
|
||
"description": "Python script to check CVE-2020-5902 (F5 BIG-IP devices).",
|
||
"stargazers_count": 1,
|
||
"forks_count": 0,
|
||
"created_at": "2020-07-06T14:41:29Z"
|
||
},
|
||
{
|
||
"name": "CVE-2020-5902",
|
||
"full_name": "amitlttwo/CVE-2020-5902",
|
||
"html_url": "https://github.com/amitlttwo/CVE-2020-5902",
|
||
"description": "In BIG-IP versions 15.0.0-15.1.0.3, 14.1.0-14.1.2.5, 13.1.0-13.1.3.3, 12.1.0-12.1.5.1, and 11.6.1-11.6.5.1, the Traffic Management User Interface (TMUI), also referred to as the Configuration utility, has a Remote Code Execution (RCE) vulnerability in undisclosed pages.",
|
||
"stargazers_count": 1,
|
||
"forks_count": 0,
|
||
"created_at": "2023-02-07T11:07:23Z"
|
||
}
|
||
] |