PoC-in-GitHub/2022/CVE-2022-46169.json

420 lines
14 KiB
JSON
Raw Normal View History

2023-01-02 13:13:52 +01:00
[
2023-03-28 08:29:06 +02:00
{
"id": 575289853,
"name": "CVE-2022-46169",
"full_name": "imjdl\/CVE-2022-46169",
"owner": {
"login": "imjdl",
"id": 31382943,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31382943?v=4",
"html_url": "https:\/\/github.com\/imjdl"
},
"html_url": "https:\/\/github.com\/imjdl\/CVE-2022-46169",
"description": "CVE-2022-46169",
"fork": false,
"created_at": "2022-12-07T07:11:23Z",
"updated_at": "2023-03-28T06:17:46Z",
"pushed_at": "2022-12-07T07:17:37Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
2023-01-02 13:13:52 +01:00
{
"id": 575651169,
"name": "CVE-2022-46169",
"full_name": "0xf4n9x\/CVE-2022-46169",
"owner": {
"login": "0xf4n9x",
"id": 40891670,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/40891670?v=4",
"html_url": "https:\/\/github.com\/0xf4n9x"
},
"html_url": "https:\/\/github.com\/0xf4n9x\/CVE-2022-46169",
"description": "CVE-2022-46169 Cacti remote_agent.php Unauthenticated Command Injection.",
"fork": false,
"created_at": "2022-12-08T01:52:13Z",
2023-04-04 20:29:00 +02:00
"updated_at": "2023-04-04T16:56:01Z",
2023-01-02 13:13:52 +01:00
"pushed_at": "2022-12-08T02:50:46Z",
2023-02-26 19:28:01 +01:00
"stargazers_count": 44,
"watchers_count": 44,
2023-01-02 13:13:52 +01:00
"has_discussions": false,
2023-02-02 07:29:51 +01:00
"forks_count": 12,
2023-01-02 13:13:52 +01:00
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
2023-02-02 07:29:51 +01:00
"forks": 12,
2023-02-26 19:28:01 +01:00
"watchers": 44,
2023-01-02 13:13:52 +01:00
"score": 0
},
{
"id": 579086902,
"name": "CVE-2022-46169",
"full_name": "taythebot\/CVE-2022-46169",
"owner": {
"login": "taythebot",
"id": 60461479,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/60461479?v=4",
"html_url": "https:\/\/github.com\/taythebot"
},
"html_url": "https:\/\/github.com\/taythebot\/CVE-2022-46169",
"description": "CVE-2022-46169 - Cacti Blind Remote Code Execution (Pre-Auth)",
"fork": false,
"created_at": "2022-12-16T16:16:35Z",
2023-01-06 01:13:35 +01:00
"updated_at": "2023-01-05T21:32:10Z",
2023-01-02 13:13:52 +01:00
"pushed_at": "2022-12-16T16:53:51Z",
2023-01-06 01:13:35 +01:00
"stargazers_count": 1,
"watchers_count": 1,
2023-01-02 13:13:52 +01:00
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
2023-01-06 01:13:35 +01:00
"watchers": 1,
2023-01-02 13:13:52 +01:00
"score": 0
2023-01-07 01:35:14 +01:00
},
{
"id": 584490516,
"name": "CVE-2022-46169",
"full_name": "Inplex-sys\/CVE-2022-46169",
"owner": {
"login": "Inplex-sys",
"id": 69421356,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/69421356?v=4",
"html_url": "https:\/\/github.com\/Inplex-sys"
},
"html_url": "https:\/\/github.com\/Inplex-sys\/CVE-2022-46169",
"description": "Cacti Unauthenticated Command Injection",
"fork": false,
"created_at": "2023-01-02T18:03:26Z",
2023-03-11 07:28:10 +01:00
"updated_at": "2023-03-11T00:41:32Z",
2023-01-07 01:35:14 +01:00
"pushed_at": "2023-01-02T18:05:45Z",
2023-03-11 07:28:10 +01:00
"stargazers_count": 3,
"watchers_count": 3,
2023-01-07 01:35:14 +01:00
"has_discussions": false,
2023-01-13 19:30:07 +01:00
"forks_count": 2,
2023-01-07 01:35:14 +01:00
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cacti",
"cve",
"hgrab-framework",
"poc",
"rce",
"scanner",
"vulnerability"
],
"visibility": "public",
2023-01-13 19:30:07 +01:00
"forks": 2,
2023-03-11 07:28:10 +01:00
"watchers": 3,
2023-01-07 01:35:14 +01:00
"score": 0
},
2023-01-21 01:29:43 +01:00
{
"id": 585629170,
"name": "CVE-2022-46169",
"full_name": "sAsPeCt488\/CVE-2022-46169",
"owner": {
"login": "sAsPeCt488",
"id": 55363474,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/55363474?v=4",
"html_url": "https:\/\/github.com\/sAsPeCt488"
},
"html_url": "https:\/\/github.com\/sAsPeCt488\/CVE-2022-46169",
"description": "PoC for CVE-2022-46169 - Unauthenticated RCE on Cacti <= 1.2.22",
"fork": false,
"created_at": "2023-01-05T16:56:06Z",
2023-04-03 02:28:10 +02:00
"updated_at": "2023-04-02T21:24:51Z",
2023-01-28 19:29:30 +01:00
"pushed_at": "2023-01-28T15:15:28Z",
2023-04-03 02:28:10 +02:00
"stargazers_count": 12,
"watchers_count": 12,
2023-01-21 01:29:43 +01:00
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cacti",
2023-02-25 01:30:12 +01:00
"cve-2022-46169",
"poc"
2023-01-21 01:29:43 +01:00
],
"visibility": "public",
"forks": 4,
2023-04-03 02:28:10 +02:00
"watchers": 12,
2023-01-21 01:29:43 +01:00
"score": 0
},
2023-01-13 07:33:35 +01:00
{
"id": 588437634,
"name": "CVE-2022-46169",
"full_name": "Anthonyc3rb3ru5\/CVE-2022-46169",
"owner": {
"login": "Anthonyc3rb3ru5",
"id": 109983457,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/109983457?v=4",
"html_url": "https:\/\/github.com\/Anthonyc3rb3ru5"
},
"html_url": "https:\/\/github.com\/Anthonyc3rb3ru5\/CVE-2022-46169",
"description": "Exploit to CVE-2022-46169 vulnerability",
"fork": false,
"created_at": "2023-01-13T05:37:56Z",
2023-02-13 07:30:03 +01:00
"updated_at": "2023-02-13T01:40:39Z",
2023-01-17 01:29:56 +01:00
"pushed_at": "2023-01-16T23:14:04Z",
2023-02-13 07:30:03 +01:00
"stargazers_count": 8,
"watchers_count": 8,
2023-01-13 07:33:35 +01:00
"has_discussions": false,
2023-02-13 07:30:03 +01:00
"forks_count": 5,
2023-01-13 07:33:35 +01:00
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
2023-02-13 07:30:03 +01:00
"forks": 5,
"watchers": 8,
2023-01-16 13:35:32 +01:00
"score": 0
},
{
"id": 589360535,
"name": "CVE-2022-46169",
2023-02-25 13:28:00 +01:00
"full_name": "Habib0x0\/CVE-2022-46169",
2023-01-16 13:35:32 +01:00
"owner": {
2023-02-25 13:28:00 +01:00
"login": "Habib0x0",
2023-01-16 13:35:32 +01:00
"id": 24976957,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/24976957?v=4",
2023-02-25 13:28:00 +01:00
"html_url": "https:\/\/github.com\/Habib0x0"
2023-01-16 13:35:32 +01:00
},
2023-02-25 13:28:00 +01:00
"html_url": "https:\/\/github.com\/Habib0x0\/CVE-2022-46169",
2023-01-16 13:35:32 +01:00
"description": "Cacti: Unauthenticated Remote Code Execution Exploit in Ruby ",
"fork": false,
"created_at": "2023-01-15T22:46:52Z",
2023-02-13 13:33:27 +01:00
"updated_at": "2023-02-13T09:30:29Z",
2023-01-20 13:30:27 +01:00
"pushed_at": "2023-01-20T07:10:39Z",
2023-02-13 13:33:27 +01:00
"stargazers_count": 2,
"watchers_count": 2,
2023-01-16 13:35:32 +01:00
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
2023-02-13 13:33:27 +01:00
"watchers": 2,
2023-01-16 13:35:32 +01:00
"score": 0
},
{
"id": 589524043,
"name": "CVE-2022-46169_POC",
"full_name": "N1arut\/CVE-2022-46169_POC",
"owner": {
"login": "N1arut",
"id": 41994914,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/41994914?v=4",
"html_url": "https:\/\/github.com\/N1arut"
},
"html_url": "https:\/\/github.com\/N1arut\/CVE-2022-46169_POC",
"description": "RCE POC for CVE-2022-46169",
"fork": false,
"created_at": "2023-01-16T10:21:26Z",
"updated_at": "2023-01-16T11:33:15Z",
2023-01-17 19:30:30 +01:00
"pushed_at": "2023-01-17T16:32:46Z",
2023-01-16 13:35:32 +01:00
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
2023-01-13 07:33:35 +01:00
"score": 0
2023-02-02 19:32:31 +01:00
},
{
"id": 596690527,
"name": "CVE-2022-46169",
"full_name": "miko550\/CVE-2022-46169",
"owner": {
"login": "miko550",
"id": 83682793,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/83682793?v=4",
"html_url": "https:\/\/github.com\/miko550"
},
"html_url": "https:\/\/github.com\/miko550\/CVE-2022-46169",
"description": null,
"fork": false,
"created_at": "2023-02-02T18:21:08Z",
"updated_at": "2023-02-02T18:25:02Z",
2023-02-03 01:29:45 +01:00
"pushed_at": "2023-02-02T18:42:54Z",
2023-02-02 19:32:31 +01:00
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
2023-03-13 07:28:24 +01:00
},
{
"id": 612724556,
"name": "cacti-cve-2022-46169-exploit",
"full_name": "ariyaadinatha\/cacti-cve-2022-46169-exploit",
"owner": {
"login": "ariyaadinatha",
"id": 54601298,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/54601298?v=4",
"html_url": "https:\/\/github.com\/ariyaadinatha"
},
"html_url": "https:\/\/github.com\/ariyaadinatha\/cacti-cve-2022-46169-exploit",
"description": "This is poc of CVE-2022-46169 authentication bypass and remote code execution",
"fork": false,
"created_at": "2023-03-11T19:39:44Z",
2023-03-13 13:31:54 +01:00
"updated_at": "2023-03-13T06:30:41Z",
2023-03-14 19:35:02 +01:00
"pushed_at": "2023-03-14T17:32:03Z",
2023-03-13 13:31:54 +01:00
"stargazers_count": 1,
"watchers_count": 1,
2023-03-13 07:28:24 +01:00
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
2023-03-13 13:31:54 +01:00
"watchers": 1,
2023-03-13 07:28:24 +01:00
"score": 0
2023-03-21 01:28:14 +01:00
},
{
"id": 616701865,
"name": "CVE-2022-46169",
"full_name": "doosec101\/CVE-2022-46169",
"owner": {
"login": "doosec101",
"id": 128431701,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/128431701?v=4",
"html_url": "https:\/\/github.com\/doosec101"
},
"html_url": "https:\/\/github.com\/doosec101\/CVE-2022-46169",
"description": "Repo for CVE-2022-46169",
"fork": false,
"created_at": "2023-03-20T22:54:18Z",
"updated_at": "2023-03-20T23:57:27Z",
2023-03-21 07:28:34 +01:00
"pushed_at": "2023-03-21T04:56:18Z",
2023-03-21 01:28:14 +01:00
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"score": 0
2023-04-02 02:28:08 +02:00
},
2023-04-03 20:41:46 +02:00
{
"id": 622325901,
"name": "cacti-rce-cve-2022-46169-vulnerable-application",
"full_name": "m3ssap0\/cacti-rce-cve-2022-46169-vulnerable-application",
"owner": {
"login": "m3ssap0",
"id": 705120,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/705120?v=4",
"html_url": "https:\/\/github.com\/m3ssap0"
},
"html_url": "https:\/\/github.com\/m3ssap0\/cacti-rce-cve-2022-46169-vulnerable-application",
"description": "WARNING: This is a vulnerable application to test the exploit for the Cacti command injection (CVE-2022-46169). Run it at your own risk!",
"fork": false,
"created_at": "2023-04-01T19:20:29Z",
"updated_at": "2023-04-03T14:44:50Z",
"pushed_at": "2023-04-03T11:01:24Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
2023-04-02 02:28:08 +02:00
{
"id": 622368239,
"name": "CVE-2022-46169_poc",
"full_name": "devAL3X\/CVE-2022-46169_poc",
"owner": {
"login": "devAL3X",
"id": 40294005,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/40294005?v=4",
"html_url": "https:\/\/github.com\/devAL3X"
},
"html_url": "https:\/\/github.com\/devAL3X\/CVE-2022-46169_poc",
"description": null,
"fork": false,
"created_at": "2023-04-01T22:37:37Z",
"updated_at": "2023-04-01T22:37:46Z",
"pushed_at": "2023-04-01T22:37:43Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
2023-04-08 02:28:50 +02:00
},
{
"id": 625050292,
"name": "CVE-2022-46169_unauth_remote_code_execution",
"full_name": "JacobEbben\/CVE-2022-46169_unauth_remote_code_execution",
"owner": {
"login": "JacobEbben",
"id": 112503338,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/112503338?v=4",
"html_url": "https:\/\/github.com\/JacobEbben"
},
"html_url": "https:\/\/github.com\/JacobEbben\/CVE-2022-46169_unauth_remote_code_execution",
"description": "Unauthenticated Remote Code Execution through authentication bypass and command injection in Cacti < 1.2.23 and < 1.3.0",
"fork": false,
"created_at": "2023-04-07T23:40:53Z",
2023-04-11 14:32:12 +02:00
"updated_at": "2023-04-11T08:16:52Z",
2023-04-09 14:29:09 +02:00
"pushed_at": "2023-04-09T11:02:59Z",
2023-04-11 14:32:12 +02:00
"stargazers_count": 1,
"watchers_count": 1,
2023-04-08 02:28:50 +02:00
"has_discussions": false,
2023-04-11 14:32:12 +02:00
"forks_count": 1,
2023-04-08 02:28:50 +02:00
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
2023-04-11 14:32:12 +02:00
"forks": 1,
"watchers": 1,
2023-04-08 02:28:50 +02:00
"score": 0
2023-01-02 13:13:52 +01:00
}
]