PoC-in-GitHub/2022/CVE-2022-46169.json

376 lines
13 KiB
JSON
Raw Normal View History

2023-01-02 21:13:52 +09:00
[
2023-03-28 15:29:06 +09:00
{
"id": 575289853,
"name": "CVE-2022-46169",
"full_name": "imjdl\/CVE-2022-46169",
"owner": {
"login": "imjdl",
"id": 31382943,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31382943?v=4",
"html_url": "https:\/\/github.com\/imjdl"
},
"html_url": "https:\/\/github.com\/imjdl\/CVE-2022-46169",
"description": "CVE-2022-46169",
"fork": false,
"created_at": "2022-12-07T07:11:23Z",
"updated_at": "2023-03-28T06:17:46Z",
"pushed_at": "2022-12-07T07:17:37Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
2023-06-19 22:46:37 +09:00
"score": 0,
"subscribers_count": 0
2023-03-28 15:29:06 +09:00
},
2023-01-02 21:13:52 +09:00
{
"id": 575651169,
"name": "CVE-2022-46169",
"full_name": "0xf4n9x\/CVE-2022-46169",
"owner": {
"login": "0xf4n9x",
"id": 40891670,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/40891670?v=4",
"html_url": "https:\/\/github.com\/0xf4n9x"
},
"html_url": "https:\/\/github.com\/0xf4n9x\/CVE-2022-46169",
"description": "CVE-2022-46169 Cacti remote_agent.php Unauthenticated Command Injection.",
"fork": false,
"created_at": "2022-12-08T01:52:13Z",
2024-06-08 09:29:06 +09:00
"updated_at": "2024-06-07T22:14:41Z",
2023-01-02 21:13:52 +09:00
"pushed_at": "2022-12-08T02:50:46Z",
2024-03-30 15:26:32 +09:00
"stargazers_count": 49,
"watchers_count": 49,
2023-01-02 21:13:52 +09:00
"has_discussions": false,
2023-10-04 21:54:37 +09:00
"forks_count": 12,
2023-01-02 21:13:52 +09:00
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
2023-10-04 21:54:37 +09:00
"forks": 12,
2024-03-30 15:26:32 +09:00
"watchers": 49,
2023-06-19 22:46:37 +09:00
"score": 0,
"subscribers_count": 1
2023-01-02 21:13:52 +09:00
},
{
"id": 579086902,
"name": "CVE-2022-46169",
"full_name": "taythebot\/CVE-2022-46169",
"owner": {
"login": "taythebot",
"id": 60461479,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/60461479?v=4",
"html_url": "https:\/\/github.com\/taythebot"
},
"html_url": "https:\/\/github.com\/taythebot\/CVE-2022-46169",
"description": "CVE-2022-46169 - Cacti Blind Remote Code Execution (Pre-Auth)",
"fork": false,
"created_at": "2022-12-16T16:16:35Z",
2023-01-06 09:13:35 +09:00
"updated_at": "2023-01-05T21:32:10Z",
2023-01-02 21:13:52 +09:00
"pushed_at": "2022-12-16T16:53:51Z",
2023-01-06 09:13:35 +09:00
"stargazers_count": 1,
"watchers_count": 1,
2023-01-02 21:13:52 +09:00
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
2023-01-06 09:13:35 +09:00
"watchers": 1,
2023-06-19 22:46:37 +09:00
"score": 0,
"subscribers_count": 2
2023-01-07 09:35:14 +09:00
},
2023-10-12 03:34:57 +09:00
{
"id": 634912432,
"name": "CVE-2022-46169",
"full_name": "ruycr4ft\/CVE-2022-46169",
"owner": {
"login": "ruycr4ft",
"id": 103446004,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/103446004?v=4",
"html_url": "https:\/\/github.com\/ruycr4ft"
},
"html_url": "https:\/\/github.com\/ruycr4ft\/CVE-2022-46169",
"description": "Exploit for cacti version 1.2.22",
"fork": false,
"created_at": "2023-05-01T14:29:28Z",
"updated_at": "2023-10-11T14:48:00Z",
"pushed_at": "2023-10-11T14:48:53Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"score": 0,
"subscribers_count": 1
},
2023-05-02 09:31:05 +09:00
{
"id": 635027757,
"name": "CVE-2022-46169-CACTI-1.2.22",
"full_name": "FredBrave\/CVE-2022-46169-CACTI-1.2.22",
"owner": {
"login": "FredBrave",
"id": 114189847,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/114189847?v=4",
"html_url": "https:\/\/github.com\/FredBrave"
},
"html_url": "https:\/\/github.com\/FredBrave\/CVE-2022-46169-CACTI-1.2.22",
"description": "This is a exploit of CVE-2022-46169 to cacti 1.2.22. This exploit allows through an RCE to obtain a reverse shell on your computer.",
"fork": false,
"created_at": "2023-05-01T20:00:23Z",
2024-03-25 15:26:46 +09:00
"updated_at": "2024-03-25T04:11:24Z",
2023-09-12 03:44:05 +09:00
"pushed_at": "2023-09-11T17:56:27Z",
2024-03-25 15:26:46 +09:00
"stargazers_count": 36,
"watchers_count": 36,
2023-05-02 09:31:05 +09:00
"has_discussions": false,
2024-01-24 15:27:22 +09:00
"forks_count": 8,
2023-05-02 09:31:05 +09:00
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
2024-01-24 15:27:22 +09:00
"forks": 8,
2024-03-25 15:26:46 +09:00
"watchers": 36,
2023-06-19 22:46:37 +09:00
"score": 0,
"subscribers_count": 1
2023-05-02 15:36:12 +09:00
},
2023-08-01 23:07:11 +09:00
{
"id": 673282845,
"name": "CVE-2022-46169",
2023-09-18 03:26:07 +09:00
"full_name": "dawnl3ss\/CVE-2022-46169",
2023-08-01 23:07:11 +09:00
"owner": {
2023-09-18 03:26:07 +09:00
"login": "dawnl3ss",
2023-08-01 23:07:11 +09:00
"id": 52249849,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/52249849?v=4",
2023-09-18 03:26:07 +09:00
"html_url": "https:\/\/github.com\/dawnl3ss"
2023-08-01 23:07:11 +09:00
},
2023-09-18 03:26:07 +09:00
"html_url": "https:\/\/github.com\/dawnl3ss\/CVE-2022-46169",
2023-08-01 23:07:11 +09:00
"description": "Unauthenticated Command Injection in Cacti <= 1.2.22",
"fork": false,
"created_at": "2023-08-01T09:29:30Z",
"updated_at": "2023-08-01T09:30:11Z",
"pushed_at": "2023-08-01T09:31:07Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"score": 0,
2023-08-02 15:32:14 +09:00
"subscribers_count": 1
2023-08-31 03:44:25 +09:00
},
{
"id": 685095951,
"name": "CVE-2022-46169",
"full_name": "a1665454764\/CVE-2022-46169",
"owner": {
"login": "a1665454764",
"id": 143511005,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/143511005?v=4",
"html_url": "https:\/\/github.com\/a1665454764"
},
"html_url": "https:\/\/github.com\/a1665454764\/CVE-2022-46169",
"description": "CVE-2022-46169",
"fork": false,
"created_at": "2023-08-30T14:03:41Z",
2023-11-09 15:37:24 +09:00
"updated_at": "2023-11-09T02:46:53Z",
2023-08-31 03:44:25 +09:00
"pushed_at": "2023-08-30T14:06:31Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
2023-08-31 15:39:21 +09:00
"subscribers_count": 1
2023-09-10 15:32:41 +09:00
},
{
"id": 689539220,
"name": "CVE-2022-46169-Exploit",
"full_name": "0xZon\/CVE-2022-46169-Exploit",
"owner": {
"login": "0xZon",
"id": 52760493,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/52760493?v=4",
"html_url": "https:\/\/github.com\/0xZon"
},
"html_url": "https:\/\/github.com\/0xZon\/CVE-2022-46169-Exploit",
"description": null,
"fork": false,
"created_at": "2023-09-10T06:03:22Z",
"updated_at": "2023-09-10T06:03:53Z",
"pushed_at": "2023-09-10T06:28:04Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
2023-09-11 15:36:49 +09:00
"subscribers_count": 1
2023-09-11 03:26:51 +09:00
},
{
"id": 689709304,
"name": "PricklyPwn",
"full_name": "copyleftdev\/PricklyPwn",
"owner": {
"login": "copyleftdev",
"id": 11798,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11798?v=4",
"html_url": "https:\/\/github.com\/copyleftdev"
},
"html_url": "https:\/\/github.com\/copyleftdev\/PricklyPwn",
"description": "An advanced RCE tool tailored for exploiting a vulnerability in Cacti v1.2.22. Crafted with precision, this utility aids security researchers in analyzing and understanding the depth of the CVE-2022-46169 flaw. Use responsibly and ethically.",
"fork": false,
"created_at": "2023-09-10T17:00:50Z",
2024-04-29 15:30:41 +09:00
"updated_at": "2024-04-29T05:12:05Z",
2023-09-11 03:26:51 +09:00
"pushed_at": "2023-09-10T17:14:08Z",
2024-02-13 09:26:09 +09:00
"stargazers_count": 1,
"watchers_count": 1,
2023-09-11 03:26:51 +09:00
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cacti",
"command-injection",
"cve-2022-46169",
"cybersecurity",
"ethical-hacking",
"exploitation-tool",
"payload",
"penetration-testing",
"rce",
"remote-command-execution",
"reverse-shell",
"security",
"vulnerability-assessment"
],
"visibility": "public",
"forks": 0,
2024-02-13 09:26:09 +09:00
"watchers": 1,
2023-09-11 03:26:51 +09:00
"score": 0,
2024-01-22 15:50:31 +09:00
"subscribers_count": 2
2023-11-24 03:33:04 +09:00
},
{
"id": 722684867,
"name": "CVE-2022-46169",
"full_name": "0xN7y\/CVE-2022-46169",
"owner": {
"login": "0xN7y",
"id": 70061541,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/70061541?v=4",
"html_url": "https:\/\/github.com\/0xN7y"
},
"html_url": "https:\/\/github.com\/0xN7y\/CVE-2022-46169",
"description": "Exploit for CVE-2022-46169 ",
"fork": false,
"created_at": "2023-11-23T17:36:20Z",
2023-11-24 15:29:58 +09:00
"updated_at": "2023-11-24T04:38:07Z",
2023-12-07 21:32:15 +09:00
"pushed_at": "2023-12-07T08:02:51Z",
2023-11-24 15:29:58 +09:00
"stargazers_count": 1,
"watchers_count": 1,
2023-11-24 03:33:04 +09:00
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
2023-11-24 15:29:58 +09:00
"watchers": 1,
2023-11-24 03:33:04 +09:00
"score": 0,
2023-11-24 15:29:58 +09:00
"subscribers_count": 1
2024-03-29 09:26:36 +09:00
},
{
"id": 778972816,
"name": "CVE-2022-46169",
"full_name": "mind2hex\/CVE-2022-46169",
"owner": {
"login": "mind2hex",
"id": 51345640,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51345640?v=4",
"html_url": "https:\/\/github.com\/mind2hex"
},
"html_url": "https:\/\/github.com\/mind2hex\/CVE-2022-46169",
"description": null,
"fork": false,
"created_at": "2024-03-28T19:23:56Z",
"updated_at": "2024-03-28T19:44:04Z",
"pushed_at": "2024-03-28T19:24:54Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
2024-03-29 15:26:37 +09:00
"subscribers_count": 1
2024-06-12 21:29:58 +09:00
},
{
"id": 814041598,
"name": "CVE-2022-46169",
"full_name": "HPT-Intern-Task-Submission\/CVE-2022-46169",
"owner": {
"login": "HPT-Intern-Task-Submission",
"id": 169382051,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/169382051?v=4",
"html_url": "https:\/\/github.com\/HPT-Intern-Task-Submission"
},
"html_url": "https:\/\/github.com\/HPT-Intern-Task-Submission\/CVE-2022-46169",
"description": null,
"fork": false,
"created_at": "2024-06-12T08:24:30Z",
2024-06-14 15:29:37 +09:00
"updated_at": "2024-06-14T03:02:02Z",
"pushed_at": "2024-06-14T03:01:59Z",
2024-06-12 21:29:58 +09:00
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
2023-01-02 21:13:52 +09:00
}
]