2023-01-02 21:13:52 +09:00
[
2023-03-28 15:29:06 +09:00
{
"id" : 575289853 ,
"name" : "CVE-2022-46169" ,
"full_name" : "imjdl\/CVE-2022-46169" ,
"owner" : {
"login" : "imjdl" ,
"id" : 31382943 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/31382943?v=4" ,
"html_url" : "https:\/\/github.com\/imjdl"
} ,
"html_url" : "https:\/\/github.com\/imjdl\/CVE-2022-46169" ,
"description" : "CVE-2022-46169" ,
"fork" : false ,
"created_at" : "2022-12-07T07:11:23Z" ,
"updated_at" : "2023-03-28T06:17:46Z" ,
"pushed_at" : "2022-12-07T07:17:37Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
} ,
2023-01-02 21:13:52 +09:00
{
"id" : 575651169 ,
"name" : "CVE-2022-46169" ,
"full_name" : "0xf4n9x\/CVE-2022-46169" ,
"owner" : {
"login" : "0xf4n9x" ,
"id" : 40891670 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/40891670?v=4" ,
"html_url" : "https:\/\/github.com\/0xf4n9x"
} ,
"html_url" : "https:\/\/github.com\/0xf4n9x\/CVE-2022-46169" ,
"description" : "CVE-2022-46169 Cacti remote_agent.php Unauthenticated Command Injection." ,
"fork" : false ,
"created_at" : "2022-12-08T01:52:13Z" ,
2023-05-05 21:32:28 +09:00
"updated_at" : "2023-05-05T08:29:30Z" ,
2023-01-02 21:13:52 +09:00
"pushed_at" : "2022-12-08T02:50:46Z" ,
2023-05-05 21:32:28 +09:00
"stargazers_count" : 46 ,
"watchers_count" : 46 ,
2023-01-02 21:13:52 +09:00
"has_discussions" : false ,
2023-05-02 21:35:47 +09:00
"forks_count" : 13 ,
2023-01-02 21:13:52 +09:00
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
2023-05-02 21:35:47 +09:00
"forks" : 13 ,
2023-05-05 21:32:28 +09:00
"watchers" : 46 ,
2023-01-02 21:13:52 +09:00
"score" : 0
} ,
{
"id" : 579086902 ,
"name" : "CVE-2022-46169" ,
"full_name" : "taythebot\/CVE-2022-46169" ,
"owner" : {
"login" : "taythebot" ,
"id" : 60461479 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/60461479?v=4" ,
"html_url" : "https:\/\/github.com\/taythebot"
} ,
"html_url" : "https:\/\/github.com\/taythebot\/CVE-2022-46169" ,
"description" : "CVE-2022-46169 - Cacti Blind Remote Code Execution (Pre-Auth)" ,
"fork" : false ,
"created_at" : "2022-12-16T16:16:35Z" ,
2023-01-06 09:13:35 +09:00
"updated_at" : "2023-01-05T21:32:10Z" ,
2023-01-02 21:13:52 +09:00
"pushed_at" : "2022-12-16T16:53:51Z" ,
2023-01-06 09:13:35 +09:00
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
2023-01-02 21:13:52 +09:00
"has_discussions" : false ,
"forks_count" : 2 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 2 ,
2023-01-06 09:13:35 +09:00
"watchers" : 1 ,
2023-01-02 21:13:52 +09:00
"score" : 0
2023-01-07 09:35:14 +09:00
} ,
{
"id" : 584490516 ,
"name" : "CVE-2022-46169" ,
"full_name" : "Inplex-sys\/CVE-2022-46169" ,
"owner" : {
"login" : "Inplex-sys" ,
"id" : 69421356 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/69421356?v=4" ,
"html_url" : "https:\/\/github.com\/Inplex-sys"
} ,
"html_url" : "https:\/\/github.com\/Inplex-sys\/CVE-2022-46169" ,
"description" : "Cacti Unauthenticated Command Injection" ,
"fork" : false ,
"created_at" : "2023-01-02T18:03:26Z" ,
2023-03-11 15:28:10 +09:00
"updated_at" : "2023-03-11T00:41:32Z" ,
2023-01-07 09:35:14 +09:00
"pushed_at" : "2023-01-02T18:05:45Z" ,
2023-03-11 15:28:10 +09:00
"stargazers_count" : 3 ,
"watchers_count" : 3 ,
2023-01-07 09:35:14 +09:00
"has_discussions" : false ,
2023-01-14 03:30:07 +09:00
"forks_count" : 2 ,
2023-01-07 09:35:14 +09:00
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [
"cacti" ,
"cve" ,
"hgrab-framework" ,
"poc" ,
"rce" ,
"scanner" ,
"vulnerability"
] ,
"visibility" : "public" ,
2023-01-14 03:30:07 +09:00
"forks" : 2 ,
2023-03-11 15:28:10 +09:00
"watchers" : 3 ,
2023-01-07 09:35:14 +09:00
"score" : 0
} ,
2023-01-21 09:29:43 +09:00
{
"id" : 585629170 ,
"name" : "CVE-2022-46169" ,
"full_name" : "sAsPeCt488\/CVE-2022-46169" ,
"owner" : {
"login" : "sAsPeCt488" ,
"id" : 55363474 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/55363474?v=4" ,
"html_url" : "https:\/\/github.com\/sAsPeCt488"
} ,
"html_url" : "https:\/\/github.com\/sAsPeCt488\/CVE-2022-46169" ,
"description" : "PoC for CVE-2022-46169 - Unauthenticated RCE on Cacti <= 1.2.22" ,
"fork" : false ,
"created_at" : "2023-01-05T16:56:06Z" ,
2023-05-11 09:38:29 +09:00
"updated_at" : "2023-05-11T00:21:18Z" ,
2023-05-06 03:30:12 +09:00
"pushed_at" : "2023-05-05T18:06:58Z" ,
2023-05-11 09:38:29 +09:00
"stargazers_count" : 20 ,
"watchers_count" : 20 ,
2023-01-21 09:29:43 +09:00
"has_discussions" : false ,
2023-05-11 03:29:06 +09:00
"forks_count" : 6 ,
2023-01-21 09:29:43 +09:00
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [
"cacti" ,
2023-02-25 09:30:12 +09:00
"cve-2022-46169" ,
"poc"
2023-01-21 09:29:43 +09:00
] ,
"visibility" : "public" ,
2023-05-11 03:29:06 +09:00
"forks" : 6 ,
2023-05-11 09:38:29 +09:00
"watchers" : 20 ,
2023-01-21 09:29:43 +09:00
"score" : 0
} ,
2023-01-13 15:33:35 +09:00
{
"id" : 588437634 ,
"name" : "CVE-2022-46169" ,
"full_name" : "Anthonyc3rb3ru5\/CVE-2022-46169" ,
"owner" : {
"login" : "Anthonyc3rb3ru5" ,
"id" : 109983457 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/109983457?v=4" ,
"html_url" : "https:\/\/github.com\/Anthonyc3rb3ru5"
} ,
"html_url" : "https:\/\/github.com\/Anthonyc3rb3ru5\/CVE-2022-46169" ,
"description" : "Exploit to CVE-2022-46169 vulnerability" ,
"fork" : false ,
"created_at" : "2023-01-13T05:37:56Z" ,
2023-02-13 15:30:03 +09:00
"updated_at" : "2023-02-13T01:40:39Z" ,
2023-01-17 09:29:56 +09:00
"pushed_at" : "2023-01-16T23:14:04Z" ,
2023-02-13 15:30:03 +09:00
"stargazers_count" : 8 ,
"watchers_count" : 8 ,
2023-01-13 15:33:35 +09:00
"has_discussions" : false ,
2023-02-13 15:30:03 +09:00
"forks_count" : 5 ,
2023-01-13 15:33:35 +09:00
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
2023-02-13 15:30:03 +09:00
"forks" : 5 ,
"watchers" : 8 ,
2023-01-16 21:35:32 +09:00
"score" : 0
} ,
{
"id" : 589360535 ,
"name" : "CVE-2022-46169" ,
2023-02-25 21:28:00 +09:00
"full_name" : "Habib0x0\/CVE-2022-46169" ,
2023-01-16 21:35:32 +09:00
"owner" : {
2023-02-25 21:28:00 +09:00
"login" : "Habib0x0" ,
2023-01-16 21:35:32 +09:00
"id" : 24976957 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/24976957?v=4" ,
2023-02-25 21:28:00 +09:00
"html_url" : "https:\/\/github.com\/Habib0x0"
2023-01-16 21:35:32 +09:00
} ,
2023-02-25 21:28:00 +09:00
"html_url" : "https:\/\/github.com\/Habib0x0\/CVE-2022-46169" ,
2023-01-16 21:35:32 +09:00
"description" : "Cacti: Unauthenticated Remote Code Execution Exploit in Ruby " ,
"fork" : false ,
"created_at" : "2023-01-15T22:46:52Z" ,
2023-02-13 21:33:27 +09:00
"updated_at" : "2023-02-13T09:30:29Z" ,
2023-01-20 21:30:27 +09:00
"pushed_at" : "2023-01-20T07:10:39Z" ,
2023-02-13 21:33:27 +09:00
"stargazers_count" : 2 ,
"watchers_count" : 2 ,
2023-01-16 21:35:32 +09:00
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
2023-02-13 21:33:27 +09:00
"watchers" : 2 ,
2023-01-16 21:35:32 +09:00
"score" : 0
} ,
{
"id" : 589524043 ,
"name" : "CVE-2022-46169_POC" ,
"full_name" : "N1arut\/CVE-2022-46169_POC" ,
"owner" : {
"login" : "N1arut" ,
"id" : 41994914 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/41994914?v=4" ,
"html_url" : "https:\/\/github.com\/N1arut"
} ,
"html_url" : "https:\/\/github.com\/N1arut\/CVE-2022-46169_POC" ,
"description" : "RCE POC for CVE-2022-46169" ,
"fork" : false ,
"created_at" : "2023-01-16T10:21:26Z" ,
"updated_at" : "2023-01-16T11:33:15Z" ,
2023-01-18 03:30:30 +09:00
"pushed_at" : "2023-01-17T16:32:46Z" ,
2023-01-16 21:35:32 +09:00
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 1 ,
2023-01-13 15:33:35 +09:00
"score" : 0
2023-02-03 03:32:31 +09:00
} ,
{
"id" : 596690527 ,
"name" : "CVE-2022-46169" ,
"full_name" : "miko550\/CVE-2022-46169" ,
"owner" : {
"login" : "miko550" ,
"id" : 83682793 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/83682793?v=4" ,
"html_url" : "https:\/\/github.com\/miko550"
} ,
"html_url" : "https:\/\/github.com\/miko550\/CVE-2022-46169" ,
"description" : null ,
"fork" : false ,
"created_at" : "2023-02-02T18:21:08Z" ,
"updated_at" : "2023-02-02T18:25:02Z" ,
2023-02-03 09:29:45 +09:00
"pushed_at" : "2023-02-02T18:42:54Z" ,
2023-02-03 03:32:31 +09:00
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
2023-03-13 15:28:24 +09:00
} ,
{
"id" : 612724556 ,
"name" : "cacti-cve-2022-46169-exploit" ,
"full_name" : "ariyaadinatha\/cacti-cve-2022-46169-exploit" ,
"owner" : {
"login" : "ariyaadinatha" ,
"id" : 54601298 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/54601298?v=4" ,
"html_url" : "https:\/\/github.com\/ariyaadinatha"
} ,
"html_url" : "https:\/\/github.com\/ariyaadinatha\/cacti-cve-2022-46169-exploit" ,
"description" : "This is poc of CVE-2022-46169 authentication bypass and remote code execution" ,
"fork" : false ,
"created_at" : "2023-03-11T19:39:44Z" ,
2023-05-11 09:38:29 +09:00
"updated_at" : "2023-05-11T00:15:54Z" ,
2023-05-01 09:30:50 +09:00
"pushed_at" : "2023-04-30T19:58:48Z" ,
2023-05-11 09:38:29 +09:00
"stargazers_count" : 10 ,
"watchers_count" : 10 ,
2023-03-13 15:28:24 +09:00
"has_discussions" : false ,
2023-05-11 03:29:06 +09:00
"forks_count" : 4 ,
2023-03-13 15:28:24 +09:00
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
2023-05-11 03:29:06 +09:00
"forks" : 4 ,
2023-05-11 09:38:29 +09:00
"watchers" : 10 ,
2023-03-13 15:28:24 +09:00
"score" : 0
2023-03-21 09:28:14 +09:00
} ,
{
"id" : 616701865 ,
"name" : "CVE-2022-46169" ,
"full_name" : "doosec101\/CVE-2022-46169" ,
"owner" : {
"login" : "doosec101" ,
"id" : 128431701 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/128431701?v=4" ,
"html_url" : "https:\/\/github.com\/doosec101"
} ,
"html_url" : "https:\/\/github.com\/doosec101\/CVE-2022-46169" ,
"description" : "Repo for CVE-2022-46169" ,
"fork" : false ,
"created_at" : "2023-03-20T22:54:18Z" ,
"updated_at" : "2023-03-20T23:57:27Z" ,
2023-03-21 15:28:34 +09:00
"pushed_at" : "2023-03-21T04:56:18Z" ,
2023-03-21 09:28:14 +09:00
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
"has_discussions" : false ,
"forks_count" : 1 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 1 ,
"watchers" : 1 ,
"score" : 0
2023-04-02 09:28:08 +09:00
} ,
2023-04-04 03:41:46 +09:00
{
"id" : 622325901 ,
"name" : "cacti-rce-cve-2022-46169-vulnerable-application" ,
"full_name" : "m3ssap0\/cacti-rce-cve-2022-46169-vulnerable-application" ,
"owner" : {
"login" : "m3ssap0" ,
"id" : 705120 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/705120?v=4" ,
"html_url" : "https:\/\/github.com\/m3ssap0"
} ,
"html_url" : "https:\/\/github.com\/m3ssap0\/cacti-rce-cve-2022-46169-vulnerable-application" ,
"description" : "WARNING: This is a vulnerable application to test the exploit for the Cacti command injection (CVE-2022-46169). Run it at your own risk!" ,
"fork" : false ,
"created_at" : "2023-04-01T19:20:29Z" ,
"updated_at" : "2023-04-03T14:44:50Z" ,
"pushed_at" : "2023-04-03T11:01:24Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
2023-05-04 15:28:44 +09:00
"forks_count" : 1 ,
2023-04-04 03:41:46 +09:00
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
2023-05-04 15:28:44 +09:00
"forks" : 1 ,
2023-04-04 03:41:46 +09:00
"watchers" : 0 ,
"score" : 0
} ,
2023-04-02 09:28:08 +09:00
{
"id" : 622368239 ,
"name" : "CVE-2022-46169_poc" ,
"full_name" : "devAL3X\/CVE-2022-46169_poc" ,
"owner" : {
"login" : "devAL3X" ,
"id" : 40294005 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/40294005?v=4" ,
"html_url" : "https:\/\/github.com\/devAL3X"
} ,
"html_url" : "https:\/\/github.com\/devAL3X\/CVE-2022-46169_poc" ,
"description" : null ,
"fork" : false ,
"created_at" : "2023-04-01T22:37:37Z" ,
"updated_at" : "2023-04-01T22:37:46Z" ,
2023-04-14 03:30:56 +09:00
"pushed_at" : "2023-04-13T15:18:53Z" ,
2023-04-02 09:28:08 +09:00
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
2023-04-08 09:28:50 +09:00
} ,
{
"id" : 625050292 ,
"name" : "CVE-2022-46169_unauth_remote_code_execution" ,
"full_name" : "JacobEbben\/CVE-2022-46169_unauth_remote_code_execution" ,
"owner" : {
"login" : "JacobEbben" ,
"id" : 112503338 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/112503338?v=4" ,
"html_url" : "https:\/\/github.com\/JacobEbben"
} ,
"html_url" : "https:\/\/github.com\/JacobEbben\/CVE-2022-46169_unauth_remote_code_execution" ,
"description" : "Unauthenticated Remote Code Execution through authentication bypass and command injection in Cacti < 1.2.23 and < 1.3.0" ,
"fork" : false ,
"created_at" : "2023-04-07T23:40:53Z" ,
2023-04-30 09:28:26 +09:00
"updated_at" : "2023-04-29T19:31:54Z" ,
2023-04-09 21:29:09 +09:00
"pushed_at" : "2023-04-09T11:02:59Z" ,
2023-04-30 09:28:26 +09:00
"stargazers_count" : 2 ,
"watchers_count" : 2 ,
2023-04-08 09:28:50 +09:00
"has_discussions" : false ,
2023-04-11 21:32:12 +09:00
"forks_count" : 1 ,
2023-04-08 09:28:50 +09:00
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
2023-04-11 21:32:12 +09:00
"forks" : 1 ,
2023-04-30 09:28:26 +09:00
"watchers" : 2 ,
2023-04-08 09:28:50 +09:00
"score" : 0
2023-04-13 21:34:04 +09:00
} ,
{
"id" : 627335815 ,
"name" : "CVE-2022-46169" ,
"full_name" : "icebreack\/CVE-2022-46169" ,
"owner" : {
"login" : "icebreack" ,
"id" : 6855402 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/6855402?v=4" ,
"html_url" : "https:\/\/github.com\/icebreack"
} ,
"html_url" : "https:\/\/github.com\/icebreack\/CVE-2022-46169" ,
"description" : "Fixed exploit for CVE-2022-46169 (originally from https:\/\/www.exploit-db.com\/exploits\/51166)" ,
"fork" : false ,
"created_at" : "2023-04-13T08:55:08Z" ,
2023-04-15 03:35:31 +09:00
"updated_at" : "2023-04-14T17:26:04Z" ,
2023-04-13 21:34:04 +09:00
"pushed_at" : "2023-04-13T08:55:51Z" ,
2023-04-15 03:35:31 +09:00
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
2023-04-13 21:34:04 +09:00
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
2023-04-15 03:35:31 +09:00
"watchers" : 1 ,
2023-04-13 21:34:04 +09:00
"score" : 0
2023-04-30 09:28:26 +09:00
} ,
{
"id" : 634367688 ,
"name" : "CVE-2022-46169" ,
"full_name" : "devilgothies\/CVE-2022-46169" ,
"owner" : {
"login" : "devilgothies" ,
"id" : 104858033 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/104858033?v=4" ,
"html_url" : "https:\/\/github.com\/devilgothies"
} ,
"html_url" : "https:\/\/github.com\/devilgothies\/CVE-2022-46169" ,
"description" : "PoC for CVE-2022-46169 that affects Cacti 1.2.22 version" ,
"fork" : false ,
"created_at" : "2023-04-29T22:14:17Z" ,
"updated_at" : "2023-04-29T22:28:21Z" ,
"pushed_at" : "2023-04-29T22:25:25Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
2023-05-11 03:29:06 +09:00
"forks_count" : 0 ,
2023-04-30 09:28:26 +09:00
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [
"cacti" ,
"cve-2022-46169" ,
"poc" ,
"rce"
] ,
"visibility" : "public" ,
2023-05-11 03:29:06 +09:00
"forks" : 0 ,
2023-04-30 09:28:26 +09:00
"watchers" : 0 ,
"score" : 0
2023-04-30 21:29:50 +09:00
} ,
{
"id" : 634502064 ,
"name" : "CVE-2022-46169" ,
"full_name" : "yassinebk\/CVE-2022-46169" ,
"owner" : {
"login" : "yassinebk" ,
"id" : 62627838 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/62627838?v=4" ,
"html_url" : "https:\/\/github.com\/yassinebk"
} ,
"html_url" : "https:\/\/github.com\/yassinebk\/CVE-2022-46169" ,
"description" : "CVE-2022-46169" ,
"fork" : false ,
"created_at" : "2023-04-30T10:37:44Z" ,
"updated_at" : "2023-04-30T10:37:52Z" ,
"pushed_at" : "2023-04-30T10:37:49Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
2023-05-11 03:29:06 +09:00
"forks_count" : 0 ,
2023-04-30 21:29:50 +09:00
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
2023-05-11 03:29:06 +09:00
"forks" : 0 ,
2023-04-30 21:29:50 +09:00
"watchers" : 0 ,
"score" : 0
2023-05-02 03:28:58 +09:00
} ,
{
"id" : 634912432 ,
2023-05-02 09:31:05 +09:00
"name" : "CVE-2022-46169" ,
2023-05-09 03:30:41 +09:00
"full_name" : "ruycr4ft\/CVE-2022-46169" ,
2023-05-02 03:28:58 +09:00
"owner" : {
2023-05-09 03:30:41 +09:00
"login" : "ruycr4ft" ,
2023-05-02 03:28:58 +09:00
"id" : 103446004 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/103446004?v=4" ,
2023-05-09 03:30:41 +09:00
"html_url" : "https:\/\/github.com\/ruycr4ft"
2023-05-02 03:28:58 +09:00
} ,
2023-05-09 03:30:41 +09:00
"html_url" : "https:\/\/github.com\/ruycr4ft\/CVE-2022-46169" ,
2023-05-02 03:28:58 +09:00
"description" : "Exploit for cacti version 1.2.22" ,
"fork" : false ,
"created_at" : "2023-05-01T14:29:28Z" ,
2023-05-03 03:32:40 +09:00
"updated_at" : "2023-05-02T14:36:35Z" ,
2023-05-02 09:31:05 +09:00
"pushed_at" : "2023-05-01T19:13:28Z" ,
2023-05-02 03:28:58 +09:00
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
2023-05-02 09:31:05 +09:00
} ,
{
"id" : 635027757 ,
"name" : "CVE-2022-46169-CACTI-1.2.22" ,
"full_name" : "FredBrave\/CVE-2022-46169-CACTI-1.2.22" ,
"owner" : {
"login" : "FredBrave" ,
"id" : 114189847 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/114189847?v=4" ,
"html_url" : "https:\/\/github.com\/FredBrave"
} ,
"html_url" : "https:\/\/github.com\/FredBrave\/CVE-2022-46169-CACTI-1.2.22" ,
"description" : "This is a exploit of CVE-2022-46169 to cacti 1.2.22. This exploit allows through an RCE to obtain a reverse shell on your computer." ,
"fork" : false ,
"created_at" : "2023-05-01T20:00:23Z" ,
2023-05-10 09:29:42 +09:00
"updated_at" : "2023-05-09T21:35:55Z" ,
2023-05-06 03:30:12 +09:00
"pushed_at" : "2023-05-05T14:38:57Z" ,
2023-05-10 09:29:42 +09:00
"stargazers_count" : 9 ,
"watchers_count" : 9 ,
2023-05-02 09:31:05 +09:00
"has_discussions" : false ,
2023-05-12 09:31:33 +09:00
"forks_count" : 2 ,
2023-05-02 09:31:05 +09:00
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
2023-05-12 09:31:33 +09:00
"forks" : 2 ,
2023-05-10 09:29:42 +09:00
"watchers" : 9 ,
2023-05-02 15:36:12 +09:00
"score" : 0
} ,
{
"id" : 635123796 ,
"name" : "RCE-Cacti-1.2.22" ,
"full_name" : "sha-16\/RCE-Cacti-1.2.22" ,
"owner" : {
"login" : "sha-16" ,
"id" : 89037170 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/89037170?v=4" ,
"html_url" : "https:\/\/github.com\/sha-16"
} ,
"html_url" : "https:\/\/github.com\/sha-16\/RCE-Cacti-1.2.22" ,
"description" : "Este es un código del exploit CVE-2022-46169, que recree utilizando Python3! Si por ahí estás haciendo una máquina de HTB, esto te puede ser útil... 🤞✨ " ,
"fork" : false ,
"created_at" : "2023-05-02T02:41:44Z" ,
"updated_at" : "2023-05-02T02:43:30Z" ,
"pushed_at" : "2023-05-02T03:36:03Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
2023-05-02 09:31:05 +09:00
"score" : 0
2023-05-03 03:32:40 +09:00
} ,
{
"id" : 635433764 ,
"name" : "CVE-2022-46169" ,
"full_name" : "Safarchand\/CVE-2022-46169" ,
"owner" : {
"login" : "Safarchand" ,
"id" : 38681779 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/38681779?v=4" ,
"html_url" : "https:\/\/github.com\/Safarchand"
} ,
"html_url" : "https:\/\/github.com\/Safarchand\/CVE-2022-46169" ,
"description" : "Improved PoC for Unauthenticated RCE on Cacti <= 1.2.22 - CVE-2022-46169" ,
"fork" : false ,
"created_at" : "2023-05-02T17:26:11Z" ,
2023-05-05 03:29:16 +09:00
"updated_at" : "2023-05-04T17:07:23Z" ,
2023-05-03 03:32:40 +09:00
"pushed_at" : "2023-05-02T17:50:20Z" ,
2023-05-05 03:29:16 +09:00
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
2023-05-03 03:32:40 +09:00
"has_discussions" : false ,
2023-05-03 21:31:58 +09:00
"forks_count" : 1 ,
2023-05-03 03:32:40 +09:00
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [
"cacti-rce" ,
"cve-2022-46169" ,
"poc" ,
"rce"
] ,
"visibility" : "public" ,
2023-05-03 21:31:58 +09:00
"forks" : 1 ,
2023-05-05 03:29:16 +09:00
"watchers" : 1 ,
2023-05-03 03:32:40 +09:00
"score" : 0
2023-05-04 09:29:45 +09:00
} ,
{
"id" : 635946571 ,
"name" : "CVE-2022-46169" ,
"full_name" : "MarkStrendin\/CVE-2022-46169" ,
"owner" : {
"login" : "MarkStrendin" ,
"id" : 638560 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/638560?v=4" ,
"html_url" : "https:\/\/github.com\/MarkStrendin"
} ,
"html_url" : "https:\/\/github.com\/MarkStrendin\/CVE-2022-46169" ,
"description" : "Proof of concept \/ CTF script for exploiting CVE-2022-46169 in Cacti, versions >=1.2.22" ,
"fork" : false ,
"created_at" : "2023-05-03T19:53:01Z" ,
"updated_at" : "2023-05-03T19:54:22Z" ,
"pushed_at" : "2023-05-03T19:56:59Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
2023-05-05 09:28:48 +09:00
} ,
{
"id" : 636441307 ,
"name" : "CVE-2022-46169" ,
"full_name" : "BKreisel\/CVE-2022-46169" ,
"owner" : {
"login" : "BKreisel" ,
"id" : 1513073 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/1513073?v=4" ,
"html_url" : "https:\/\/github.com\/BKreisel"
} ,
"html_url" : "https:\/\/github.com\/BKreisel\/CVE-2022-46169" ,
"description" : "🐍 Python Exploit for CVE-2022-46169" ,
"fork" : false ,
"created_at" : "2023-05-04T21:21:05Z" ,
"updated_at" : "2023-05-04T22:04:32Z" ,
"pushed_at" : "2023-05-04T22:03:20Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
2023-05-11 03:29:06 +09:00
"forks_count" : 0 ,
2023-05-05 09:28:48 +09:00
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [
"cve" ,
"cve-2022-46169" ,
"exploit" ,
"python"
] ,
"visibility" : "public" ,
2023-05-11 03:29:06 +09:00
"forks" : 0 ,
2023-05-05 09:28:48 +09:00
"watchers" : 0 ,
"score" : 0
2023-05-12 15:39:36 +09:00
} ,
{
"id" : 639674200 ,
"name" : "ImprovedShell-for-CVE-2022-46169" ,
"full_name" : "ahanel13\/ImprovedShell-for-CVE-2022-46169" ,
"owner" : {
"login" : "ahanel13" ,
"id" : 47185077 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/47185077?v=4" ,
"html_url" : "https:\/\/github.com\/ahanel13"
} ,
"html_url" : "https:\/\/github.com\/ahanel13\/ImprovedShell-for-CVE-2022-46169" ,
"description" : "This Python script aids in exploiting CVE-2022-46169 by automating payload delivery and response handling. It starts an HTTP server, listens for requests, and enables command input for real-time interaction with a vulnerable target." ,
"fork" : false ,
"created_at" : "2023-05-12T01:20:15Z" ,
"updated_at" : "2023-05-12T01:22:35Z" ,
2023-05-13 09:28:47 +09:00
"pushed_at" : "2023-05-12T19:52:21Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
} ,
{
"id" : 640014872 ,
"name" : "EH2-PoC" ,
"full_name" : "Rickster5555\/EH2-PoC" ,
"owner" : {
"login" : "Rickster5555" ,
"id" : 92229061 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/92229061?v=4" ,
"html_url" : "https:\/\/github.com\/Rickster5555"
} ,
"html_url" : "https:\/\/github.com\/Rickster5555\/EH2-PoC" ,
"description" : "A simple PoC for CVE-2022-46169 a.k.a Cacti Unauthenticated Command Injection, a vulnerability allows an unauthenticated user to execute arbitrary code on a server running Cacti prior from version 1.2.17 to 1.2.22" ,
"fork" : false ,
"created_at" : "2023-05-12T19:08:45Z" ,
"updated_at" : "2023-05-12T19:29:22Z" ,
"pushed_at" : "2023-05-12T19:49:19Z" ,
2023-05-12 15:39:36 +09:00
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
2023-01-02 21:13:52 +09:00
}
]