2023-01-02 13:13:52 +01:00
[
2023-03-28 08:29:06 +02:00
{
"id" : 575289853 ,
"name" : "CVE-2022-46169" ,
"full_name" : "imjdl\/CVE-2022-46169" ,
"owner" : {
"login" : "imjdl" ,
"id" : 31382943 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/31382943?v=4" ,
"html_url" : "https:\/\/github.com\/imjdl"
} ,
"html_url" : "https:\/\/github.com\/imjdl\/CVE-2022-46169" ,
"description" : "CVE-2022-46169" ,
"fork" : false ,
"created_at" : "2022-12-07T07:11:23Z" ,
"updated_at" : "2023-03-28T06:17:46Z" ,
"pushed_at" : "2022-12-07T07:17:37Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
} ,
2023-01-02 13:13:52 +01:00
{
"id" : 575651169 ,
"name" : "CVE-2022-46169" ,
"full_name" : "0xf4n9x\/CVE-2022-46169" ,
"owner" : {
"login" : "0xf4n9x" ,
"id" : 40891670 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/40891670?v=4" ,
"html_url" : "https:\/\/github.com\/0xf4n9x"
} ,
"html_url" : "https:\/\/github.com\/0xf4n9x\/CVE-2022-46169" ,
"description" : "CVE-2022-46169 Cacti remote_agent.php Unauthenticated Command Injection." ,
"fork" : false ,
"created_at" : "2022-12-08T01:52:13Z" ,
2023-04-04 20:29:00 +02:00
"updated_at" : "2023-04-04T16:56:01Z" ,
2023-01-02 13:13:52 +01:00
"pushed_at" : "2022-12-08T02:50:46Z" ,
2023-02-26 19:28:01 +01:00
"stargazers_count" : 44 ,
"watchers_count" : 44 ,
2023-01-02 13:13:52 +01:00
"has_discussions" : false ,
2023-02-02 07:29:51 +01:00
"forks_count" : 12 ,
2023-01-02 13:13:52 +01:00
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
2023-02-02 07:29:51 +01:00
"forks" : 12 ,
2023-02-26 19:28:01 +01:00
"watchers" : 44 ,
2023-01-02 13:13:52 +01:00
"score" : 0
} ,
{
"id" : 579086902 ,
"name" : "CVE-2022-46169" ,
"full_name" : "taythebot\/CVE-2022-46169" ,
"owner" : {
"login" : "taythebot" ,
"id" : 60461479 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/60461479?v=4" ,
"html_url" : "https:\/\/github.com\/taythebot"
} ,
"html_url" : "https:\/\/github.com\/taythebot\/CVE-2022-46169" ,
"description" : "CVE-2022-46169 - Cacti Blind Remote Code Execution (Pre-Auth)" ,
"fork" : false ,
"created_at" : "2022-12-16T16:16:35Z" ,
2023-01-06 01:13:35 +01:00
"updated_at" : "2023-01-05T21:32:10Z" ,
2023-01-02 13:13:52 +01:00
"pushed_at" : "2022-12-16T16:53:51Z" ,
2023-01-06 01:13:35 +01:00
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
2023-01-02 13:13:52 +01:00
"has_discussions" : false ,
"forks_count" : 2 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 2 ,
2023-01-06 01:13:35 +01:00
"watchers" : 1 ,
2023-01-02 13:13:52 +01:00
"score" : 0
2023-01-07 01:35:14 +01:00
} ,
{
"id" : 584490516 ,
"name" : "CVE-2022-46169" ,
"full_name" : "Inplex-sys\/CVE-2022-46169" ,
"owner" : {
"login" : "Inplex-sys" ,
"id" : 69421356 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/69421356?v=4" ,
"html_url" : "https:\/\/github.com\/Inplex-sys"
} ,
"html_url" : "https:\/\/github.com\/Inplex-sys\/CVE-2022-46169" ,
"description" : "Cacti Unauthenticated Command Injection" ,
"fork" : false ,
"created_at" : "2023-01-02T18:03:26Z" ,
2023-03-11 07:28:10 +01:00
"updated_at" : "2023-03-11T00:41:32Z" ,
2023-01-07 01:35:14 +01:00
"pushed_at" : "2023-01-02T18:05:45Z" ,
2023-03-11 07:28:10 +01:00
"stargazers_count" : 3 ,
"watchers_count" : 3 ,
2023-01-07 01:35:14 +01:00
"has_discussions" : false ,
2023-01-13 19:30:07 +01:00
"forks_count" : 2 ,
2023-01-07 01:35:14 +01:00
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [
"cacti" ,
"cve" ,
"hgrab-framework" ,
"poc" ,
"rce" ,
"scanner" ,
"vulnerability"
] ,
"visibility" : "public" ,
2023-01-13 19:30:07 +01:00
"forks" : 2 ,
2023-03-11 07:28:10 +01:00
"watchers" : 3 ,
2023-01-07 01:35:14 +01:00
"score" : 0
} ,
2023-01-21 01:29:43 +01:00
{
"id" : 585629170 ,
"name" : "CVE-2022-46169" ,
"full_name" : "sAsPeCt488\/CVE-2022-46169" ,
"owner" : {
"login" : "sAsPeCt488" ,
"id" : 55363474 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/55363474?v=4" ,
"html_url" : "https:\/\/github.com\/sAsPeCt488"
} ,
"html_url" : "https:\/\/github.com\/sAsPeCt488\/CVE-2022-46169" ,
"description" : "PoC for CVE-2022-46169 - Unauthenticated RCE on Cacti <= 1.2.22" ,
"fork" : false ,
"created_at" : "2023-01-05T16:56:06Z" ,
2023-05-01 14:31:44 +02:00
"updated_at" : "2023-05-01T11:28:57Z" ,
2023-04-30 14:29:50 +02:00
"pushed_at" : "2023-04-30T09:47:10Z" ,
2023-05-01 14:31:44 +02:00
"stargazers_count" : 15 ,
"watchers_count" : 15 ,
2023-01-21 01:29:43 +01:00
"has_discussions" : false ,
"forks_count" : 4 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [
"cacti" ,
2023-02-25 01:30:12 +01:00
"cve-2022-46169" ,
"poc"
2023-01-21 01:29:43 +01:00
] ,
"visibility" : "public" ,
"forks" : 4 ,
2023-05-01 14:31:44 +02:00
"watchers" : 15 ,
2023-01-21 01:29:43 +01:00
"score" : 0
} ,
2023-01-13 07:33:35 +01:00
{
"id" : 588437634 ,
"name" : "CVE-2022-46169" ,
"full_name" : "Anthonyc3rb3ru5\/CVE-2022-46169" ,
"owner" : {
"login" : "Anthonyc3rb3ru5" ,
"id" : 109983457 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/109983457?v=4" ,
"html_url" : "https:\/\/github.com\/Anthonyc3rb3ru5"
} ,
"html_url" : "https:\/\/github.com\/Anthonyc3rb3ru5\/CVE-2022-46169" ,
"description" : "Exploit to CVE-2022-46169 vulnerability" ,
"fork" : false ,
"created_at" : "2023-01-13T05:37:56Z" ,
2023-02-13 07:30:03 +01:00
"updated_at" : "2023-02-13T01:40:39Z" ,
2023-01-17 01:29:56 +01:00
"pushed_at" : "2023-01-16T23:14:04Z" ,
2023-02-13 07:30:03 +01:00
"stargazers_count" : 8 ,
"watchers_count" : 8 ,
2023-01-13 07:33:35 +01:00
"has_discussions" : false ,
2023-02-13 07:30:03 +01:00
"forks_count" : 5 ,
2023-01-13 07:33:35 +01:00
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
2023-02-13 07:30:03 +01:00
"forks" : 5 ,
"watchers" : 8 ,
2023-01-16 13:35:32 +01:00
"score" : 0
} ,
{
"id" : 589360535 ,
"name" : "CVE-2022-46169" ,
2023-02-25 13:28:00 +01:00
"full_name" : "Habib0x0\/CVE-2022-46169" ,
2023-01-16 13:35:32 +01:00
"owner" : {
2023-02-25 13:28:00 +01:00
"login" : "Habib0x0" ,
2023-01-16 13:35:32 +01:00
"id" : 24976957 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/24976957?v=4" ,
2023-02-25 13:28:00 +01:00
"html_url" : "https:\/\/github.com\/Habib0x0"
2023-01-16 13:35:32 +01:00
} ,
2023-02-25 13:28:00 +01:00
"html_url" : "https:\/\/github.com\/Habib0x0\/CVE-2022-46169" ,
2023-01-16 13:35:32 +01:00
"description" : "Cacti: Unauthenticated Remote Code Execution Exploit in Ruby " ,
"fork" : false ,
"created_at" : "2023-01-15T22:46:52Z" ,
2023-02-13 13:33:27 +01:00
"updated_at" : "2023-02-13T09:30:29Z" ,
2023-01-20 13:30:27 +01:00
"pushed_at" : "2023-01-20T07:10:39Z" ,
2023-02-13 13:33:27 +01:00
"stargazers_count" : 2 ,
"watchers_count" : 2 ,
2023-01-16 13:35:32 +01:00
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
2023-02-13 13:33:27 +01:00
"watchers" : 2 ,
2023-01-16 13:35:32 +01:00
"score" : 0
} ,
{
"id" : 589524043 ,
"name" : "CVE-2022-46169_POC" ,
"full_name" : "N1arut\/CVE-2022-46169_POC" ,
"owner" : {
"login" : "N1arut" ,
"id" : 41994914 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/41994914?v=4" ,
"html_url" : "https:\/\/github.com\/N1arut"
} ,
"html_url" : "https:\/\/github.com\/N1arut\/CVE-2022-46169_POC" ,
"description" : "RCE POC for CVE-2022-46169" ,
"fork" : false ,
"created_at" : "2023-01-16T10:21:26Z" ,
"updated_at" : "2023-01-16T11:33:15Z" ,
2023-01-17 19:30:30 +01:00
"pushed_at" : "2023-01-17T16:32:46Z" ,
2023-01-16 13:35:32 +01:00
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 1 ,
2023-01-13 07:33:35 +01:00
"score" : 0
2023-02-02 19:32:31 +01:00
} ,
{
"id" : 596690527 ,
"name" : "CVE-2022-46169" ,
"full_name" : "miko550\/CVE-2022-46169" ,
"owner" : {
"login" : "miko550" ,
"id" : 83682793 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/83682793?v=4" ,
"html_url" : "https:\/\/github.com\/miko550"
} ,
"html_url" : "https:\/\/github.com\/miko550\/CVE-2022-46169" ,
"description" : null ,
"fork" : false ,
"created_at" : "2023-02-02T18:21:08Z" ,
"updated_at" : "2023-02-02T18:25:02Z" ,
2023-02-03 01:29:45 +01:00
"pushed_at" : "2023-02-02T18:42:54Z" ,
2023-02-02 19:32:31 +01:00
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
2023-03-13 07:28:24 +01:00
} ,
{
"id" : 612724556 ,
"name" : "cacti-cve-2022-46169-exploit" ,
"full_name" : "ariyaadinatha\/cacti-cve-2022-46169-exploit" ,
"owner" : {
"login" : "ariyaadinatha" ,
"id" : 54601298 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/54601298?v=4" ,
"html_url" : "https:\/\/github.com\/ariyaadinatha"
} ,
"html_url" : "https:\/\/github.com\/ariyaadinatha\/cacti-cve-2022-46169-exploit" ,
"description" : "This is poc of CVE-2022-46169 authentication bypass and remote code execution" ,
"fork" : false ,
"created_at" : "2023-03-11T19:39:44Z" ,
2023-05-02 02:31:05 +02:00
"updated_at" : "2023-05-01T19:56:23Z" ,
2023-05-01 02:30:50 +02:00
"pushed_at" : "2023-04-30T19:58:48Z" ,
2023-05-02 02:31:05 +02:00
"stargazers_count" : 8 ,
"watchers_count" : 8 ,
2023-03-13 07:28:24 +01:00
"has_discussions" : false ,
2023-05-01 20:28:58 +02:00
"forks_count" : 4 ,
2023-03-13 07:28:24 +01:00
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
2023-05-01 20:28:58 +02:00
"forks" : 4 ,
2023-05-02 02:31:05 +02:00
"watchers" : 8 ,
2023-03-13 07:28:24 +01:00
"score" : 0
2023-03-21 01:28:14 +01:00
} ,
{
"id" : 616701865 ,
"name" : "CVE-2022-46169" ,
"full_name" : "doosec101\/CVE-2022-46169" ,
"owner" : {
"login" : "doosec101" ,
"id" : 128431701 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/128431701?v=4" ,
"html_url" : "https:\/\/github.com\/doosec101"
} ,
"html_url" : "https:\/\/github.com\/doosec101\/CVE-2022-46169" ,
"description" : "Repo for CVE-2022-46169" ,
"fork" : false ,
"created_at" : "2023-03-20T22:54:18Z" ,
"updated_at" : "2023-03-20T23:57:27Z" ,
2023-03-21 07:28:34 +01:00
"pushed_at" : "2023-03-21T04:56:18Z" ,
2023-03-21 01:28:14 +01:00
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
"has_discussions" : false ,
"forks_count" : 1 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 1 ,
"watchers" : 1 ,
"score" : 0
2023-04-02 02:28:08 +02:00
} ,
2023-04-03 20:41:46 +02:00
{
"id" : 622325901 ,
"name" : "cacti-rce-cve-2022-46169-vulnerable-application" ,
"full_name" : "m3ssap0\/cacti-rce-cve-2022-46169-vulnerable-application" ,
"owner" : {
"login" : "m3ssap0" ,
"id" : 705120 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/705120?v=4" ,
"html_url" : "https:\/\/github.com\/m3ssap0"
} ,
"html_url" : "https:\/\/github.com\/m3ssap0\/cacti-rce-cve-2022-46169-vulnerable-application" ,
"description" : "WARNING: This is a vulnerable application to test the exploit for the Cacti command injection (CVE-2022-46169). Run it at your own risk!" ,
"fork" : false ,
"created_at" : "2023-04-01T19:20:29Z" ,
"updated_at" : "2023-04-03T14:44:50Z" ,
"pushed_at" : "2023-04-03T11:01:24Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
} ,
2023-04-02 02:28:08 +02:00
{
"id" : 622368239 ,
"name" : "CVE-2022-46169_poc" ,
"full_name" : "devAL3X\/CVE-2022-46169_poc" ,
"owner" : {
"login" : "devAL3X" ,
"id" : 40294005 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/40294005?v=4" ,
"html_url" : "https:\/\/github.com\/devAL3X"
} ,
"html_url" : "https:\/\/github.com\/devAL3X\/CVE-2022-46169_poc" ,
"description" : null ,
"fork" : false ,
"created_at" : "2023-04-01T22:37:37Z" ,
"updated_at" : "2023-04-01T22:37:46Z" ,
2023-04-13 20:30:56 +02:00
"pushed_at" : "2023-04-13T15:18:53Z" ,
2023-04-02 02:28:08 +02:00
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
2023-04-08 02:28:50 +02:00
} ,
{
"id" : 625050292 ,
"name" : "CVE-2022-46169_unauth_remote_code_execution" ,
"full_name" : "JacobEbben\/CVE-2022-46169_unauth_remote_code_execution" ,
"owner" : {
"login" : "JacobEbben" ,
"id" : 112503338 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/112503338?v=4" ,
"html_url" : "https:\/\/github.com\/JacobEbben"
} ,
"html_url" : "https:\/\/github.com\/JacobEbben\/CVE-2022-46169_unauth_remote_code_execution" ,
"description" : "Unauthenticated Remote Code Execution through authentication bypass and command injection in Cacti < 1.2.23 and < 1.3.0" ,
"fork" : false ,
"created_at" : "2023-04-07T23:40:53Z" ,
2023-04-30 02:28:26 +02:00
"updated_at" : "2023-04-29T19:31:54Z" ,
2023-04-09 14:29:09 +02:00
"pushed_at" : "2023-04-09T11:02:59Z" ,
2023-04-30 02:28:26 +02:00
"stargazers_count" : 2 ,
"watchers_count" : 2 ,
2023-04-08 02:28:50 +02:00
"has_discussions" : false ,
2023-04-11 14:32:12 +02:00
"forks_count" : 1 ,
2023-04-08 02:28:50 +02:00
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
2023-04-11 14:32:12 +02:00
"forks" : 1 ,
2023-04-30 02:28:26 +02:00
"watchers" : 2 ,
2023-04-08 02:28:50 +02:00
"score" : 0
2023-04-13 14:34:04 +02:00
} ,
{
"id" : 627335815 ,
"name" : "CVE-2022-46169" ,
"full_name" : "icebreack\/CVE-2022-46169" ,
"owner" : {
"login" : "icebreack" ,
"id" : 6855402 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/6855402?v=4" ,
"html_url" : "https:\/\/github.com\/icebreack"
} ,
"html_url" : "https:\/\/github.com\/icebreack\/CVE-2022-46169" ,
"description" : "Fixed exploit for CVE-2022-46169 (originally from https:\/\/www.exploit-db.com\/exploits\/51166)" ,
"fork" : false ,
"created_at" : "2023-04-13T08:55:08Z" ,
2023-04-14 20:35:31 +02:00
"updated_at" : "2023-04-14T17:26:04Z" ,
2023-04-13 14:34:04 +02:00
"pushed_at" : "2023-04-13T08:55:51Z" ,
2023-04-14 20:35:31 +02:00
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
2023-04-13 14:34:04 +02:00
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
2023-04-14 20:35:31 +02:00
"watchers" : 1 ,
2023-04-13 14:34:04 +02:00
"score" : 0
2023-04-30 02:28:26 +02:00
} ,
{
"id" : 634367688 ,
"name" : "CVE-2022-46169" ,
"full_name" : "devilgothies\/CVE-2022-46169" ,
"owner" : {
"login" : "devilgothies" ,
"id" : 104858033 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/104858033?v=4" ,
"html_url" : "https:\/\/github.com\/devilgothies"
} ,
"html_url" : "https:\/\/github.com\/devilgothies\/CVE-2022-46169" ,
"description" : "PoC for CVE-2022-46169 that affects Cacti 1.2.22 version" ,
"fork" : false ,
"created_at" : "2023-04-29T22:14:17Z" ,
"updated_at" : "2023-04-29T22:28:21Z" ,
"pushed_at" : "2023-04-29T22:25:25Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [
"cacti" ,
"cve-2022-46169" ,
"poc" ,
"rce"
] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
2023-04-30 14:29:50 +02:00
} ,
{
"id" : 634502064 ,
"name" : "CVE-2022-46169" ,
"full_name" : "yassinebk\/CVE-2022-46169" ,
"owner" : {
"login" : "yassinebk" ,
"id" : 62627838 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/62627838?v=4" ,
"html_url" : "https:\/\/github.com\/yassinebk"
} ,
"html_url" : "https:\/\/github.com\/yassinebk\/CVE-2022-46169" ,
"description" : "CVE-2022-46169" ,
"fork" : false ,
"created_at" : "2023-04-30T10:37:44Z" ,
"updated_at" : "2023-04-30T10:37:52Z" ,
"pushed_at" : "2023-04-30T10:37:49Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
2023-05-01 20:28:58 +02:00
} ,
{
"id" : 634912432 ,
2023-05-02 02:31:05 +02:00
"name" : "CVE-2022-46169" ,
"full_name" : "Ruycraft1514\/CVE-2022-46169" ,
2023-05-01 20:28:58 +02:00
"owner" : {
"login" : "Ruycraft1514" ,
"id" : 103446004 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/103446004?v=4" ,
"html_url" : "https:\/\/github.com\/Ruycraft1514"
} ,
2023-05-02 02:31:05 +02:00
"html_url" : "https:\/\/github.com\/Ruycraft1514\/CVE-2022-46169" ,
2023-05-01 20:28:58 +02:00
"description" : "Exploit for cacti version 1.2.22" ,
"fork" : false ,
"created_at" : "2023-05-01T14:29:28Z" ,
2023-05-02 02:31:05 +02:00
"updated_at" : "2023-05-01T19:12:58Z" ,
"pushed_at" : "2023-05-01T19:13:28Z" ,
2023-05-01 20:28:58 +02:00
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
2023-05-02 02:31:05 +02:00
} ,
{
"id" : 635027757 ,
"name" : "CVE-2022-46169-CACTI-1.2.22" ,
"full_name" : "FredBrave\/CVE-2022-46169-CACTI-1.2.22" ,
"owner" : {
"login" : "FredBrave" ,
"id" : 114189847 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/114189847?v=4" ,
"html_url" : "https:\/\/github.com\/FredBrave"
} ,
"html_url" : "https:\/\/github.com\/FredBrave\/CVE-2022-46169-CACTI-1.2.22" ,
"description" : "This is a exploit of CVE-2022-46169 to cacti 1.2.22. This exploit allows through an RCE to obtain a reverse shell on your computer." ,
"fork" : false ,
"created_at" : "2023-05-01T20:00:23Z" ,
2023-05-02 08:36:12 +02:00
"updated_at" : "2023-05-02T02:38:48Z" ,
2023-05-02 02:31:05 +02:00
"pushed_at" : "2023-05-01T20:11:33Z" ,
2023-05-02 08:36:12 +02:00
"stargazers_count" : 3 ,
"watchers_count" : 3 ,
2023-05-02 02:31:05 +02:00
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
2023-05-02 08:36:12 +02:00
"watchers" : 3 ,
"score" : 0
} ,
{
"id" : 635123796 ,
"name" : "RCE-Cacti-1.2.22" ,
"full_name" : "sha-16\/RCE-Cacti-1.2.22" ,
"owner" : {
"login" : "sha-16" ,
"id" : 89037170 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/89037170?v=4" ,
"html_url" : "https:\/\/github.com\/sha-16"
} ,
"html_url" : "https:\/\/github.com\/sha-16\/RCE-Cacti-1.2.22" ,
"description" : "Este es un código del exploit CVE-2022-46169, que recree utilizando Python3! Si por ahí estás haciendo una máquina de HTB, esto te puede ser útil... 🤞✨ " ,
"fork" : false ,
"created_at" : "2023-05-02T02:41:44Z" ,
"updated_at" : "2023-05-02T02:43:30Z" ,
"pushed_at" : "2023-05-02T03:36:03Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
2023-05-02 02:31:05 +02:00
"score" : 0
2023-01-02 13:13:52 +01:00
}
]