2023-01-02 13:13:52 +01:00
[
2023-03-28 08:29:06 +02:00
{
"id" : 575289853 ,
"name" : "CVE-2022-46169" ,
"full_name" : "imjdl\/CVE-2022-46169" ,
"owner" : {
"login" : "imjdl" ,
"id" : 31382943 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/31382943?v=4" ,
"html_url" : "https:\/\/github.com\/imjdl"
} ,
"html_url" : "https:\/\/github.com\/imjdl\/CVE-2022-46169" ,
"description" : "CVE-2022-46169" ,
"fork" : false ,
"created_at" : "2022-12-07T07:11:23Z" ,
"updated_at" : "2023-03-28T06:17:46Z" ,
"pushed_at" : "2022-12-07T07:17:37Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
} ,
2023-01-02 13:13:52 +01:00
{
"id" : 575651169 ,
"name" : "CVE-2022-46169" ,
"full_name" : "0xf4n9x\/CVE-2022-46169" ,
"owner" : {
"login" : "0xf4n9x" ,
"id" : 40891670 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/40891670?v=4" ,
"html_url" : "https:\/\/github.com\/0xf4n9x"
} ,
"html_url" : "https:\/\/github.com\/0xf4n9x\/CVE-2022-46169" ,
"description" : "CVE-2022-46169 Cacti remote_agent.php Unauthenticated Command Injection." ,
"fork" : false ,
"created_at" : "2022-12-08T01:52:13Z" ,
2023-04-04 20:29:00 +02:00
"updated_at" : "2023-04-04T16:56:01Z" ,
2023-01-02 13:13:52 +01:00
"pushed_at" : "2022-12-08T02:50:46Z" ,
2023-02-26 19:28:01 +01:00
"stargazers_count" : 44 ,
"watchers_count" : 44 ,
2023-01-02 13:13:52 +01:00
"has_discussions" : false ,
2023-02-02 07:29:51 +01:00
"forks_count" : 12 ,
2023-01-02 13:13:52 +01:00
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
2023-02-02 07:29:51 +01:00
"forks" : 12 ,
2023-02-26 19:28:01 +01:00
"watchers" : 44 ,
2023-01-02 13:13:52 +01:00
"score" : 0
} ,
{
"id" : 579086902 ,
"name" : "CVE-2022-46169" ,
"full_name" : "taythebot\/CVE-2022-46169" ,
"owner" : {
"login" : "taythebot" ,
"id" : 60461479 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/60461479?v=4" ,
"html_url" : "https:\/\/github.com\/taythebot"
} ,
"html_url" : "https:\/\/github.com\/taythebot\/CVE-2022-46169" ,
"description" : "CVE-2022-46169 - Cacti Blind Remote Code Execution (Pre-Auth)" ,
"fork" : false ,
"created_at" : "2022-12-16T16:16:35Z" ,
2023-01-06 01:13:35 +01:00
"updated_at" : "2023-01-05T21:32:10Z" ,
2023-01-02 13:13:52 +01:00
"pushed_at" : "2022-12-16T16:53:51Z" ,
2023-01-06 01:13:35 +01:00
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
2023-01-02 13:13:52 +01:00
"has_discussions" : false ,
"forks_count" : 2 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 2 ,
2023-01-06 01:13:35 +01:00
"watchers" : 1 ,
2023-01-02 13:13:52 +01:00
"score" : 0
2023-01-07 01:35:14 +01:00
} ,
{
"id" : 584490516 ,
"name" : "CVE-2022-46169" ,
"full_name" : "Inplex-sys\/CVE-2022-46169" ,
"owner" : {
"login" : "Inplex-sys" ,
"id" : 69421356 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/69421356?v=4" ,
"html_url" : "https:\/\/github.com\/Inplex-sys"
} ,
"html_url" : "https:\/\/github.com\/Inplex-sys\/CVE-2022-46169" ,
"description" : "Cacti Unauthenticated Command Injection" ,
"fork" : false ,
"created_at" : "2023-01-02T18:03:26Z" ,
2023-03-11 07:28:10 +01:00
"updated_at" : "2023-03-11T00:41:32Z" ,
2023-01-07 01:35:14 +01:00
"pushed_at" : "2023-01-02T18:05:45Z" ,
2023-03-11 07:28:10 +01:00
"stargazers_count" : 3 ,
"watchers_count" : 3 ,
2023-01-07 01:35:14 +01:00
"has_discussions" : false ,
2023-01-13 19:30:07 +01:00
"forks_count" : 2 ,
2023-01-07 01:35:14 +01:00
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [
"cacti" ,
"cve" ,
"hgrab-framework" ,
"poc" ,
"rce" ,
"scanner" ,
"vulnerability"
] ,
"visibility" : "public" ,
2023-01-13 19:30:07 +01:00
"forks" : 2 ,
2023-03-11 07:28:10 +01:00
"watchers" : 3 ,
2023-01-07 01:35:14 +01:00
"score" : 0
} ,
2023-01-21 01:29:43 +01:00
{
"id" : 585629170 ,
"name" : "CVE-2022-46169" ,
"full_name" : "sAsPeCt488\/CVE-2022-46169" ,
"owner" : {
"login" : "sAsPeCt488" ,
"id" : 55363474 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/55363474?v=4" ,
"html_url" : "https:\/\/github.com\/sAsPeCt488"
} ,
"html_url" : "https:\/\/github.com\/sAsPeCt488\/CVE-2022-46169" ,
"description" : "PoC for CVE-2022-46169 - Unauthenticated RCE on Cacti <= 1.2.22" ,
"fork" : false ,
"created_at" : "2023-01-05T16:56:06Z" ,
2023-04-03 02:28:10 +02:00
"updated_at" : "2023-04-02T21:24:51Z" ,
2023-01-28 19:29:30 +01:00
"pushed_at" : "2023-01-28T15:15:28Z" ,
2023-04-03 02:28:10 +02:00
"stargazers_count" : 12 ,
"watchers_count" : 12 ,
2023-01-21 01:29:43 +01:00
"has_discussions" : false ,
"forks_count" : 4 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [
"cacti" ,
2023-02-25 01:30:12 +01:00
"cve-2022-46169" ,
"poc"
2023-01-21 01:29:43 +01:00
] ,
"visibility" : "public" ,
"forks" : 4 ,
2023-04-03 02:28:10 +02:00
"watchers" : 12 ,
2023-01-21 01:29:43 +01:00
"score" : 0
} ,
2023-01-13 07:33:35 +01:00
{
"id" : 588437634 ,
"name" : "CVE-2022-46169" ,
"full_name" : "Anthonyc3rb3ru5\/CVE-2022-46169" ,
"owner" : {
"login" : "Anthonyc3rb3ru5" ,
"id" : 109983457 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/109983457?v=4" ,
"html_url" : "https:\/\/github.com\/Anthonyc3rb3ru5"
} ,
"html_url" : "https:\/\/github.com\/Anthonyc3rb3ru5\/CVE-2022-46169" ,
"description" : "Exploit to CVE-2022-46169 vulnerability" ,
"fork" : false ,
"created_at" : "2023-01-13T05:37:56Z" ,
2023-02-13 07:30:03 +01:00
"updated_at" : "2023-02-13T01:40:39Z" ,
2023-01-17 01:29:56 +01:00
"pushed_at" : "2023-01-16T23:14:04Z" ,
2023-02-13 07:30:03 +01:00
"stargazers_count" : 8 ,
"watchers_count" : 8 ,
2023-01-13 07:33:35 +01:00
"has_discussions" : false ,
2023-02-13 07:30:03 +01:00
"forks_count" : 5 ,
2023-01-13 07:33:35 +01:00
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
2023-02-13 07:30:03 +01:00
"forks" : 5 ,
"watchers" : 8 ,
2023-01-16 13:35:32 +01:00
"score" : 0
} ,
{
"id" : 589360535 ,
"name" : "CVE-2022-46169" ,
2023-02-25 13:28:00 +01:00
"full_name" : "Habib0x0\/CVE-2022-46169" ,
2023-01-16 13:35:32 +01:00
"owner" : {
2023-02-25 13:28:00 +01:00
"login" : "Habib0x0" ,
2023-01-16 13:35:32 +01:00
"id" : 24976957 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/24976957?v=4" ,
2023-02-25 13:28:00 +01:00
"html_url" : "https:\/\/github.com\/Habib0x0"
2023-01-16 13:35:32 +01:00
} ,
2023-02-25 13:28:00 +01:00
"html_url" : "https:\/\/github.com\/Habib0x0\/CVE-2022-46169" ,
2023-01-16 13:35:32 +01:00
"description" : "Cacti: Unauthenticated Remote Code Execution Exploit in Ruby " ,
"fork" : false ,
"created_at" : "2023-01-15T22:46:52Z" ,
2023-02-13 13:33:27 +01:00
"updated_at" : "2023-02-13T09:30:29Z" ,
2023-01-20 13:30:27 +01:00
"pushed_at" : "2023-01-20T07:10:39Z" ,
2023-02-13 13:33:27 +01:00
"stargazers_count" : 2 ,
"watchers_count" : 2 ,
2023-01-16 13:35:32 +01:00
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
2023-02-13 13:33:27 +01:00
"watchers" : 2 ,
2023-01-16 13:35:32 +01:00
"score" : 0
} ,
{
"id" : 589524043 ,
"name" : "CVE-2022-46169_POC" ,
"full_name" : "N1arut\/CVE-2022-46169_POC" ,
"owner" : {
"login" : "N1arut" ,
"id" : 41994914 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/41994914?v=4" ,
"html_url" : "https:\/\/github.com\/N1arut"
} ,
"html_url" : "https:\/\/github.com\/N1arut\/CVE-2022-46169_POC" ,
"description" : "RCE POC for CVE-2022-46169" ,
"fork" : false ,
"created_at" : "2023-01-16T10:21:26Z" ,
"updated_at" : "2023-01-16T11:33:15Z" ,
2023-01-17 19:30:30 +01:00
"pushed_at" : "2023-01-17T16:32:46Z" ,
2023-01-16 13:35:32 +01:00
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 1 ,
2023-01-13 07:33:35 +01:00
"score" : 0
2023-02-02 19:32:31 +01:00
} ,
{
"id" : 596690527 ,
"name" : "CVE-2022-46169" ,
"full_name" : "miko550\/CVE-2022-46169" ,
"owner" : {
"login" : "miko550" ,
"id" : 83682793 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/83682793?v=4" ,
"html_url" : "https:\/\/github.com\/miko550"
} ,
"html_url" : "https:\/\/github.com\/miko550\/CVE-2022-46169" ,
"description" : null ,
"fork" : false ,
"created_at" : "2023-02-02T18:21:08Z" ,
"updated_at" : "2023-02-02T18:25:02Z" ,
2023-02-03 01:29:45 +01:00
"pushed_at" : "2023-02-02T18:42:54Z" ,
2023-02-02 19:32:31 +01:00
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
2023-03-13 07:28:24 +01:00
} ,
{
"id" : 612724556 ,
"name" : "cacti-cve-2022-46169-exploit" ,
"full_name" : "ariyaadinatha\/cacti-cve-2022-46169-exploit" ,
"owner" : {
"login" : "ariyaadinatha" ,
"id" : 54601298 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/54601298?v=4" ,
"html_url" : "https:\/\/github.com\/ariyaadinatha"
} ,
"html_url" : "https:\/\/github.com\/ariyaadinatha\/cacti-cve-2022-46169-exploit" ,
"description" : "This is poc of CVE-2022-46169 authentication bypass and remote code execution" ,
"fork" : false ,
"created_at" : "2023-03-11T19:39:44Z" ,
2023-03-13 13:31:54 +01:00
"updated_at" : "2023-03-13T06:30:41Z" ,
2023-03-14 19:35:02 +01:00
"pushed_at" : "2023-03-14T17:32:03Z" ,
2023-03-13 13:31:54 +01:00
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
2023-03-13 07:28:24 +01:00
"has_discussions" : false ,
"forks_count" : 1 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 1 ,
2023-03-13 13:31:54 +01:00
"watchers" : 1 ,
2023-03-13 07:28:24 +01:00
"score" : 0
2023-03-21 01:28:14 +01:00
} ,
{
"id" : 616701865 ,
"name" : "CVE-2022-46169" ,
"full_name" : "doosec101\/CVE-2022-46169" ,
"owner" : {
"login" : "doosec101" ,
"id" : 128431701 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/128431701?v=4" ,
"html_url" : "https:\/\/github.com\/doosec101"
} ,
"html_url" : "https:\/\/github.com\/doosec101\/CVE-2022-46169" ,
"description" : "Repo for CVE-2022-46169" ,
"fork" : false ,
"created_at" : "2023-03-20T22:54:18Z" ,
"updated_at" : "2023-03-20T23:57:27Z" ,
2023-03-21 07:28:34 +01:00
"pushed_at" : "2023-03-21T04:56:18Z" ,
2023-03-21 01:28:14 +01:00
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
"has_discussions" : false ,
"forks_count" : 1 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 1 ,
"watchers" : 1 ,
"score" : 0
2023-04-02 02:28:08 +02:00
} ,
2023-04-03 20:41:46 +02:00
{
"id" : 622325901 ,
"name" : "cacti-rce-cve-2022-46169-vulnerable-application" ,
"full_name" : "m3ssap0\/cacti-rce-cve-2022-46169-vulnerable-application" ,
"owner" : {
"login" : "m3ssap0" ,
"id" : 705120 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/705120?v=4" ,
"html_url" : "https:\/\/github.com\/m3ssap0"
} ,
"html_url" : "https:\/\/github.com\/m3ssap0\/cacti-rce-cve-2022-46169-vulnerable-application" ,
"description" : "WARNING: This is a vulnerable application to test the exploit for the Cacti command injection (CVE-2022-46169). Run it at your own risk!" ,
"fork" : false ,
"created_at" : "2023-04-01T19:20:29Z" ,
"updated_at" : "2023-04-03T14:44:50Z" ,
"pushed_at" : "2023-04-03T11:01:24Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
} ,
2023-04-02 02:28:08 +02:00
{
"id" : 622368239 ,
"name" : "CVE-2022-46169_poc" ,
"full_name" : "devAL3X\/CVE-2022-46169_poc" ,
"owner" : {
"login" : "devAL3X" ,
"id" : 40294005 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/40294005?v=4" ,
"html_url" : "https:\/\/github.com\/devAL3X"
} ,
"html_url" : "https:\/\/github.com\/devAL3X\/CVE-2022-46169_poc" ,
"description" : null ,
"fork" : false ,
"created_at" : "2023-04-01T22:37:37Z" ,
"updated_at" : "2023-04-01T22:37:46Z" ,
"pushed_at" : "2023-04-01T22:37:43Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
2023-04-08 02:28:50 +02:00
} ,
{
"id" : 625050292 ,
"name" : "CVE-2022-46169_unauth_remote_code_execution" ,
"full_name" : "JacobEbben\/CVE-2022-46169_unauth_remote_code_execution" ,
"owner" : {
"login" : "JacobEbben" ,
"id" : 112503338 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/112503338?v=4" ,
"html_url" : "https:\/\/github.com\/JacobEbben"
} ,
"html_url" : "https:\/\/github.com\/JacobEbben\/CVE-2022-46169_unauth_remote_code_execution" ,
"description" : "Unauthenticated Remote Code Execution through authentication bypass and command injection in Cacti < 1.2.23 and < 1.3.0" ,
"fork" : false ,
"created_at" : "2023-04-07T23:40:53Z" ,
"updated_at" : "2023-04-07T23:44:02Z" ,
"pushed_at" : "2023-04-07T23:46:19Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
2023-01-02 13:13:52 +01:00
}
]