2023-01-02 13:13:52 +01:00
[
2023-03-28 08:29:06 +02:00
{
"id" : 575289853 ,
"name" : "CVE-2022-46169" ,
"full_name" : "imjdl\/CVE-2022-46169" ,
"owner" : {
"login" : "imjdl" ,
"id" : 31382943 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/31382943?v=4" ,
"html_url" : "https:\/\/github.com\/imjdl"
} ,
"html_url" : "https:\/\/github.com\/imjdl\/CVE-2022-46169" ,
"description" : "CVE-2022-46169" ,
"fork" : false ,
"created_at" : "2022-12-07T07:11:23Z" ,
"updated_at" : "2023-03-28T06:17:46Z" ,
"pushed_at" : "2022-12-07T07:17:37Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
2023-06-19 15:46:37 +02:00
"score" : 0 ,
"subscribers_count" : 0
2023-03-28 08:29:06 +02:00
} ,
2023-01-02 13:13:52 +01:00
{
"id" : 575651169 ,
"name" : "CVE-2022-46169" ,
"full_name" : "0xf4n9x\/CVE-2022-46169" ,
"owner" : {
"login" : "0xf4n9x" ,
"id" : 40891670 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/40891670?v=4" ,
"html_url" : "https:\/\/github.com\/0xf4n9x"
} ,
"html_url" : "https:\/\/github.com\/0xf4n9x\/CVE-2022-46169" ,
"description" : "CVE-2022-46169 Cacti remote_agent.php Unauthenticated Command Injection." ,
"fork" : false ,
"created_at" : "2022-12-08T01:52:13Z" ,
2024-03-30 07:26:32 +01:00
"updated_at" : "2024-03-30T01:37:05Z" ,
2023-01-02 13:13:52 +01:00
"pushed_at" : "2022-12-08T02:50:46Z" ,
2024-03-30 07:26:32 +01:00
"stargazers_count" : 49 ,
"watchers_count" : 49 ,
2023-01-02 13:13:52 +01:00
"has_discussions" : false ,
2023-10-04 14:54:37 +02:00
"forks_count" : 12 ,
2023-01-02 13:13:52 +01:00
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
2023-10-04 14:54:37 +02:00
"forks" : 12 ,
2024-03-30 07:26:32 +01:00
"watchers" : 49 ,
2023-06-19 15:46:37 +02:00
"score" : 0 ,
"subscribers_count" : 1
2023-01-02 13:13:52 +01:00
} ,
{
"id" : 579086902 ,
"name" : "CVE-2022-46169" ,
"full_name" : "taythebot\/CVE-2022-46169" ,
"owner" : {
"login" : "taythebot" ,
"id" : 60461479 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/60461479?v=4" ,
"html_url" : "https:\/\/github.com\/taythebot"
} ,
"html_url" : "https:\/\/github.com\/taythebot\/CVE-2022-46169" ,
"description" : "CVE-2022-46169 - Cacti Blind Remote Code Execution (Pre-Auth)" ,
"fork" : false ,
"created_at" : "2022-12-16T16:16:35Z" ,
2023-01-06 01:13:35 +01:00
"updated_at" : "2023-01-05T21:32:10Z" ,
2023-01-02 13:13:52 +01:00
"pushed_at" : "2022-12-16T16:53:51Z" ,
2023-01-06 01:13:35 +01:00
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
2023-01-02 13:13:52 +01:00
"has_discussions" : false ,
"forks_count" : 2 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 2 ,
2023-01-06 01:13:35 +01:00
"watchers" : 1 ,
2023-06-19 15:46:37 +02:00
"score" : 0 ,
"subscribers_count" : 2
2023-01-07 01:35:14 +01:00
} ,
2023-11-30 13:58:11 +01:00
{
"id" : 584490516 ,
"name" : "CVE-2022-46169" ,
"full_name" : "Inplex-sys\/CVE-2022-46169" ,
"owner" : {
"login" : "Inplex-sys" ,
"id" : 69421356 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/69421356?v=4" ,
"html_url" : "https:\/\/github.com\/Inplex-sys"
} ,
"html_url" : "https:\/\/github.com\/Inplex-sys\/CVE-2022-46169" ,
"description" : "Cacti Unauthenticated Command Injection" ,
"fork" : false ,
"created_at" : "2023-01-02T18:03:26Z" ,
"updated_at" : "2023-03-11T00:41:32Z" ,
"pushed_at" : "2023-01-02T18:05:45Z" ,
"stargazers_count" : 3 ,
"watchers_count" : 3 ,
"has_discussions" : false ,
"forks_count" : 2 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [
"cacti" ,
"cve" ,
"hgrab-framework" ,
"poc" ,
"rce" ,
"scanner" ,
"vulnerability"
] ,
"visibility" : "public" ,
"forks" : 2 ,
"watchers" : 3 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
2023-01-21 01:29:43 +01:00
{
"id" : 585629170 ,
"name" : "CVE-2022-46169" ,
"full_name" : "sAsPeCt488\/CVE-2022-46169" ,
"owner" : {
"login" : "sAsPeCt488" ,
"id" : 55363474 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/55363474?v=4" ,
"html_url" : "https:\/\/github.com\/sAsPeCt488"
} ,
"html_url" : "https:\/\/github.com\/sAsPeCt488\/CVE-2022-46169" ,
"description" : "PoC for CVE-2022-46169 - Unauthenticated RCE on Cacti <= 1.2.22" ,
"fork" : false ,
"created_at" : "2023-01-05T16:56:06Z" ,
2023-12-07 01:45:51 +01:00
"updated_at" : "2023-12-06T21:51:12Z" ,
2023-05-05 20:30:12 +02:00
"pushed_at" : "2023-05-05T18:06:58Z" ,
2023-08-22 20:31:07 +02:00
"stargazers_count" : 28 ,
"watchers_count" : 28 ,
2023-01-21 01:29:43 +01:00
"has_discussions" : false ,
2023-07-08 20:29:30 +02:00
"forks_count" : 8 ,
2023-01-21 01:29:43 +01:00
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [
"cacti" ,
2023-02-25 01:30:12 +01:00
"cve-2022-46169" ,
"poc"
2023-01-21 01:29:43 +01:00
] ,
"visibility" : "public" ,
2023-07-08 20:29:30 +02:00
"forks" : 8 ,
2023-08-22 20:31:07 +02:00
"watchers" : 28 ,
2023-06-19 15:46:37 +02:00
"score" : 0 ,
"subscribers_count" : 1
2023-01-21 01:29:43 +01:00
} ,
2023-11-03 07:25:04 +01:00
{
"id" : 588437634 ,
"name" : "CVE-2022-46169" ,
2024-05-30 14:29:18 +02:00
"full_name" : "c3rrberu5\/CVE-2022-46169" ,
2023-11-03 07:25:04 +01:00
"owner" : {
2024-05-30 14:29:18 +02:00
"login" : "c3rrberu5" ,
2023-11-03 07:25:04 +01:00
"id" : 109983457 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/109983457?v=4" ,
2024-05-30 14:29:18 +02:00
"html_url" : "https:\/\/github.com\/c3rrberu5"
2023-11-03 07:25:04 +01:00
} ,
2024-05-30 14:29:18 +02:00
"html_url" : "https:\/\/github.com\/c3rrberu5\/CVE-2022-46169" ,
2023-11-03 07:25:04 +01:00
"description" : "Exploit to CVE-2022-46169 vulnerability" ,
"fork" : false ,
"created_at" : "2023-01-13T05:37:56Z" ,
"updated_at" : "2023-06-21T15:12:42Z" ,
"pushed_at" : "2023-01-16T23:14:04Z" ,
"stargazers_count" : 9 ,
"watchers_count" : 9 ,
"has_discussions" : false ,
"forks_count" : 5 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 5 ,
"watchers" : 9 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 589360535 ,
"name" : "CVE-2022-46169" ,
"full_name" : "Habib0x0\/CVE-2022-46169" ,
"owner" : {
"login" : "Habib0x0" ,
"id" : 24976957 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/24976957?v=4" ,
"html_url" : "https:\/\/github.com\/Habib0x0"
} ,
"html_url" : "https:\/\/github.com\/Habib0x0\/CVE-2022-46169" ,
"description" : "Cacti: Unauthenticated Remote Code Execution Exploit in Ruby " ,
"fork" : false ,
"created_at" : "2023-01-15T22:46:52Z" ,
"updated_at" : "2023-02-13T09:30:29Z" ,
"pushed_at" : "2023-01-20T07:10:39Z" ,
"stargazers_count" : 2 ,
"watchers_count" : 2 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 2 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 589524043 ,
"name" : "CVE-2022-46169_POC" ,
"full_name" : "N1arut\/CVE-2022-46169_POC" ,
"owner" : {
"login" : "N1arut" ,
"id" : 41994914 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/41994914?v=4" ,
"html_url" : "https:\/\/github.com\/N1arut"
} ,
"html_url" : "https:\/\/github.com\/N1arut\/CVE-2022-46169_POC" ,
"description" : "RCE POC for CVE-2022-46169" ,
"fork" : false ,
"created_at" : "2023-01-16T10:21:26Z" ,
"updated_at" : "2023-10-08T20:21:44Z" ,
"pushed_at" : "2023-01-17T16:32:46Z" ,
"stargazers_count" : 3 ,
"watchers_count" : 3 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 3 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 596690527 ,
"name" : "CVE-2022-46169" ,
"full_name" : "miko550\/CVE-2022-46169" ,
"owner" : {
"login" : "miko550" ,
"id" : 83682793 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/83682793?v=4" ,
"html_url" : "https:\/\/github.com\/miko550"
} ,
"html_url" : "https:\/\/github.com\/miko550\/CVE-2022-46169" ,
"description" : null ,
"fork" : false ,
"created_at" : "2023-02-02T18:21:08Z" ,
"updated_at" : "2023-02-02T18:25:02Z" ,
"pushed_at" : "2023-02-02T18:42:54Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
2023-03-13 07:28:24 +01:00
{
"id" : 612724556 ,
"name" : "cacti-cve-2022-46169-exploit" ,
"full_name" : "ariyaadinatha\/cacti-cve-2022-46169-exploit" ,
"owner" : {
"login" : "ariyaadinatha" ,
"id" : 54601298 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/54601298?v=4" ,
"html_url" : "https:\/\/github.com\/ariyaadinatha"
} ,
"html_url" : "https:\/\/github.com\/ariyaadinatha\/cacti-cve-2022-46169-exploit" ,
"description" : "This is poc of CVE-2022-46169 authentication bypass and remote code execution" ,
"fork" : false ,
"created_at" : "2023-03-11T19:39:44Z" ,
2023-11-22 01:32:58 +01:00
"updated_at" : "2023-11-22T00:03:33Z" ,
2023-05-19 02:31:36 +02:00
"pushed_at" : "2023-05-18T19:06:36Z" ,
2023-11-22 01:32:58 +01:00
"stargazers_count" : 16 ,
"watchers_count" : 16 ,
2023-03-13 07:28:24 +01:00
"has_discussions" : false ,
2023-06-21 08:50:57 +02:00
"forks_count" : 5 ,
2023-03-13 07:28:24 +01:00
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
2023-06-21 08:50:57 +02:00
"forks" : 5 ,
2023-11-22 01:32:58 +01:00
"watchers" : 16 ,
2023-06-19 15:46:37 +02:00
"score" : 0 ,
"subscribers_count" : 2
2023-03-21 01:28:14 +01:00
} ,
2023-11-03 07:25:04 +01:00
{
"id" : 616701865 ,
"name" : "CVE-2022-46169" ,
"full_name" : "doosec101\/CVE-2022-46169" ,
"owner" : {
"login" : "doosec101" ,
"id" : 128431701 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/128431701?v=4" ,
"html_url" : "https:\/\/github.com\/doosec101"
} ,
"html_url" : "https:\/\/github.com\/doosec101\/CVE-2022-46169" ,
"description" : "Repo for CVE-2022-46169" ,
"fork" : false ,
"created_at" : "2023-03-20T22:54:18Z" ,
"updated_at" : "2023-03-20T23:57:27Z" ,
"pushed_at" : "2023-03-21T04:56:18Z" ,
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
"has_discussions" : false ,
"forks_count" : 1 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 1 ,
"watchers" : 1 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 622325901 ,
"name" : "cacti-rce-cve-2022-46169-vulnerable-application" ,
"full_name" : "m3ssap0\/cacti-rce-cve-2022-46169-vulnerable-application" ,
"owner" : {
"login" : "m3ssap0" ,
"id" : 705120 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/705120?v=4" ,
"html_url" : "https:\/\/github.com\/m3ssap0"
} ,
"html_url" : "https:\/\/github.com\/m3ssap0\/cacti-rce-cve-2022-46169-vulnerable-application" ,
"description" : "WARNING: This is a vulnerable application to test the exploit for the Cacti command injection (CVE-2022-46169). Run it at your own risk!" ,
"fork" : false ,
"created_at" : "2023-04-01T19:20:29Z" ,
"updated_at" : "2023-09-22T17:23:40Z" ,
"pushed_at" : "2023-04-03T11:01:24Z" ,
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
"has_discussions" : false ,
"forks_count" : 2 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [
"cacti" ,
"command-injection" ,
"cve-2022-46169" ,
"rce" ,
"vulnerable-application"
] ,
"visibility" : "public" ,
"forks" : 2 ,
"watchers" : 1 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 622368239 ,
"name" : "CVE-2022-46169_poc" ,
"full_name" : "devAL3X\/CVE-2022-46169_poc" ,
"owner" : {
"login" : "devAL3X" ,
"id" : 40294005 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/40294005?v=4" ,
"html_url" : "https:\/\/github.com\/devAL3X"
} ,
"html_url" : "https:\/\/github.com\/devAL3X\/CVE-2022-46169_poc" ,
"description" : null ,
"fork" : false ,
"created_at" : "2023-04-01T22:37:37Z" ,
"updated_at" : "2023-04-01T22:37:46Z" ,
"pushed_at" : "2023-04-13T15:18:53Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 625050292 ,
"name" : "CVE-2022-46169_unauth_remote_code_execution" ,
"full_name" : "JacobEbben\/CVE-2022-46169_unauth_remote_code_execution" ,
"owner" : {
"login" : "JacobEbben" ,
"id" : 112503338 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/112503338?v=4" ,
"html_url" : "https:\/\/github.com\/JacobEbben"
} ,
"html_url" : "https:\/\/github.com\/JacobEbben\/CVE-2022-46169_unauth_remote_code_execution" ,
"description" : "Unauthenticated Remote Code Execution through authentication bypass and command injection in Cacti < 1.2.23 and < 1.3.0" ,
"fork" : false ,
"created_at" : "2023-04-07T23:40:53Z" ,
"updated_at" : "2023-05-13T16:45:25Z" ,
"pushed_at" : "2023-04-09T11:02:59Z" ,
"stargazers_count" : 3 ,
"watchers_count" : 3 ,
"has_discussions" : false ,
"forks_count" : 1 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 1 ,
"watchers" : 3 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 627335815 ,
"name" : "CVE-2022-46169" ,
"full_name" : "icebreack\/CVE-2022-46169" ,
"owner" : {
"login" : "icebreack" ,
"id" : 6855402 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/6855402?v=4" ,
"html_url" : "https:\/\/github.com\/icebreack"
} ,
"html_url" : "https:\/\/github.com\/icebreack\/CVE-2022-46169" ,
"description" : "Fixed exploit for CVE-2022-46169 (originally from https:\/\/www.exploit-db.com\/exploits\/51166)" ,
"fork" : false ,
"created_at" : "2023-04-13T08:55:08Z" ,
"updated_at" : "2023-04-14T17:26:04Z" ,
"pushed_at" : "2023-04-13T08:55:51Z" ,
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 1 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
2023-04-30 02:28:26 +02:00
{
"id" : 634367688 ,
"name" : "CVE-2022-46169" ,
"full_name" : "devilgothies\/CVE-2022-46169" ,
"owner" : {
"login" : "devilgothies" ,
"id" : 104858033 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/104858033?v=4" ,
"html_url" : "https:\/\/github.com\/devilgothies"
} ,
"html_url" : "https:\/\/github.com\/devilgothies\/CVE-2022-46169" ,
"description" : "PoC for CVE-2022-46169 that affects Cacti 1.2.22 version" ,
"fork" : false ,
"created_at" : "2023-04-29T22:14:17Z" ,
"updated_at" : "2023-04-29T22:28:21Z" ,
"pushed_at" : "2023-04-29T22:25:25Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
2023-05-10 20:29:06 +02:00
"forks_count" : 0 ,
2023-04-30 02:28:26 +02:00
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [
"cacti" ,
"cve-2022-46169" ,
"poc" ,
"rce"
] ,
"visibility" : "public" ,
2023-05-10 20:29:06 +02:00
"forks" : 0 ,
2023-04-30 02:28:26 +02:00
"watchers" : 0 ,
2023-06-19 15:46:37 +02:00
"score" : 0 ,
"subscribers_count" : 1
2023-04-30 14:29:50 +02:00
} ,
{
"id" : 634502064 ,
"name" : "CVE-2022-46169" ,
"full_name" : "yassinebk\/CVE-2022-46169" ,
"owner" : {
"login" : "yassinebk" ,
"id" : 62627838 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/62627838?v=4" ,
"html_url" : "https:\/\/github.com\/yassinebk"
} ,
"html_url" : "https:\/\/github.com\/yassinebk\/CVE-2022-46169" ,
"description" : "CVE-2022-46169" ,
"fork" : false ,
"created_at" : "2023-04-30T10:37:44Z" ,
"updated_at" : "2023-04-30T10:37:52Z" ,
"pushed_at" : "2023-04-30T10:37:49Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
2023-05-10 20:29:06 +02:00
"forks_count" : 0 ,
2023-04-30 14:29:50 +02:00
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
2023-05-10 20:29:06 +02:00
"forks" : 0 ,
2023-04-30 14:29:50 +02:00
"watchers" : 0 ,
2023-06-19 15:46:37 +02:00
"score" : 0 ,
"subscribers_count" : 1
2023-05-01 20:28:58 +02:00
} ,
2023-10-11 20:34:57 +02:00
{
"id" : 634912432 ,
"name" : "CVE-2022-46169" ,
"full_name" : "ruycr4ft\/CVE-2022-46169" ,
"owner" : {
"login" : "ruycr4ft" ,
"id" : 103446004 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/103446004?v=4" ,
"html_url" : "https:\/\/github.com\/ruycr4ft"
} ,
"html_url" : "https:\/\/github.com\/ruycr4ft\/CVE-2022-46169" ,
"description" : "Exploit for cacti version 1.2.22" ,
"fork" : false ,
"created_at" : "2023-05-01T14:29:28Z" ,
"updated_at" : "2023-10-11T14:48:00Z" ,
"pushed_at" : "2023-10-11T14:48:53Z" ,
"stargazers_count" : 2 ,
"watchers_count" : 2 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 2 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
2023-05-02 02:31:05 +02:00
{
"id" : 635027757 ,
"name" : "CVE-2022-46169-CACTI-1.2.22" ,
"full_name" : "FredBrave\/CVE-2022-46169-CACTI-1.2.22" ,
"owner" : {
"login" : "FredBrave" ,
"id" : 114189847 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/114189847?v=4" ,
"html_url" : "https:\/\/github.com\/FredBrave"
} ,
"html_url" : "https:\/\/github.com\/FredBrave\/CVE-2022-46169-CACTI-1.2.22" ,
"description" : "This is a exploit of CVE-2022-46169 to cacti 1.2.22. This exploit allows through an RCE to obtain a reverse shell on your computer." ,
"fork" : false ,
"created_at" : "2023-05-01T20:00:23Z" ,
2024-03-25 07:26:46 +01:00
"updated_at" : "2024-03-25T04:11:24Z" ,
2023-09-11 20:44:05 +02:00
"pushed_at" : "2023-09-11T17:56:27Z" ,
2024-03-25 07:26:46 +01:00
"stargazers_count" : 36 ,
"watchers_count" : 36 ,
2023-05-02 02:31:05 +02:00
"has_discussions" : false ,
2024-01-24 07:27:22 +01:00
"forks_count" : 8 ,
2023-05-02 02:31:05 +02:00
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
2024-01-24 07:27:22 +01:00
"forks" : 8 ,
2024-03-25 07:26:46 +01:00
"watchers" : 36 ,
2023-06-19 15:46:37 +02:00
"score" : 0 ,
"subscribers_count" : 1
2023-05-02 08:36:12 +02:00
} ,
{
"id" : 635123796 ,
"name" : "RCE-Cacti-1.2.22" ,
"full_name" : "sha-16\/RCE-Cacti-1.2.22" ,
"owner" : {
"login" : "sha-16" ,
"id" : 89037170 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/89037170?v=4" ,
"html_url" : "https:\/\/github.com\/sha-16"
} ,
"html_url" : "https:\/\/github.com\/sha-16\/RCE-Cacti-1.2.22" ,
"description" : "Este es un código del exploit CVE-2022-46169, que recree utilizando Python3! Si por ahí estás haciendo una máquina de HTB, esto te puede ser útil... 🤞✨ " ,
"fork" : false ,
"created_at" : "2023-05-02T02:41:44Z" ,
"updated_at" : "2023-05-02T02:43:30Z" ,
"pushed_at" : "2023-05-02T03:36:03Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
2023-06-19 15:46:37 +02:00
"score" : 0 ,
"subscribers_count" : 1
2023-05-02 20:32:40 +02:00
} ,
{
"id" : 635433764 ,
"name" : "CVE-2022-46169" ,
"full_name" : "Safarchand\/CVE-2022-46169" ,
"owner" : {
"login" : "Safarchand" ,
"id" : 38681779 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/38681779?v=4" ,
"html_url" : "https:\/\/github.com\/Safarchand"
} ,
"html_url" : "https:\/\/github.com\/Safarchand\/CVE-2022-46169" ,
"description" : "Improved PoC for Unauthenticated RCE on Cacti <= 1.2.22 - CVE-2022-46169" ,
"fork" : false ,
"created_at" : "2023-05-02T17:26:11Z" ,
2023-05-04 20:29:16 +02:00
"updated_at" : "2023-05-04T17:07:23Z" ,
2023-05-02 20:32:40 +02:00
"pushed_at" : "2023-05-02T17:50:20Z" ,
2023-05-04 20:29:16 +02:00
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
2023-05-02 20:32:40 +02:00
"has_discussions" : false ,
2023-05-03 14:31:58 +02:00
"forks_count" : 1 ,
2023-05-02 20:32:40 +02:00
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [
"cacti-rce" ,
"cve-2022-46169" ,
"poc" ,
"rce"
] ,
"visibility" : "public" ,
2023-05-03 14:31:58 +02:00
"forks" : 1 ,
2023-05-04 20:29:16 +02:00
"watchers" : 1 ,
2023-06-19 15:46:37 +02:00
"score" : 0 ,
"subscribers_count" : 1
2023-05-04 02:29:45 +02:00
} ,
{
"id" : 635946571 ,
"name" : "CVE-2022-46169" ,
"full_name" : "MarkStrendin\/CVE-2022-46169" ,
"owner" : {
"login" : "MarkStrendin" ,
"id" : 638560 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/638560?v=4" ,
"html_url" : "https:\/\/github.com\/MarkStrendin"
} ,
"html_url" : "https:\/\/github.com\/MarkStrendin\/CVE-2022-46169" ,
"description" : "Proof of concept \/ CTF script for exploiting CVE-2022-46169 in Cacti, versions >=1.2.22" ,
"fork" : false ,
"created_at" : "2023-05-03T19:53:01Z" ,
"updated_at" : "2023-05-03T19:54:22Z" ,
"pushed_at" : "2023-05-03T19:56:59Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
2023-06-05 14:32:56 +02:00
"forks_count" : 1 ,
2023-05-04 02:29:45 +02:00
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
2023-06-05 14:32:56 +02:00
"forks" : 1 ,
2023-05-04 02:29:45 +02:00
"watchers" : 0 ,
2023-06-19 15:46:37 +02:00
"score" : 0 ,
"subscribers_count" : 1
2023-05-05 02:28:48 +02:00
} ,
{
"id" : 636441307 ,
"name" : "CVE-2022-46169" ,
"full_name" : "BKreisel\/CVE-2022-46169" ,
"owner" : {
"login" : "BKreisel" ,
"id" : 1513073 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/1513073?v=4" ,
"html_url" : "https:\/\/github.com\/BKreisel"
} ,
"html_url" : "https:\/\/github.com\/BKreisel\/CVE-2022-46169" ,
"description" : "🐍 Python Exploit for CVE-2022-46169" ,
"fork" : false ,
"created_at" : "2023-05-04T21:21:05Z" ,
"updated_at" : "2023-05-04T22:04:32Z" ,
"pushed_at" : "2023-05-04T22:03:20Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
2023-05-10 20:29:06 +02:00
"forks_count" : 0 ,
2023-05-05 02:28:48 +02:00
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [
"cve" ,
"cve-2022-46169" ,
"exploit" ,
"python"
] ,
"visibility" : "public" ,
2023-05-10 20:29:06 +02:00
"forks" : 0 ,
2023-05-05 02:28:48 +02:00
"watchers" : 0 ,
2023-06-19 15:46:37 +02:00
"score" : 0 ,
2023-06-22 08:34:01 +02:00
"subscribers_count" : 2
2023-05-12 08:39:36 +02:00
} ,
2023-05-13 02:28:47 +02:00
{
"id" : 640014872 ,
"name" : "EH2-PoC" ,
"full_name" : "Rickster5555\/EH2-PoC" ,
"owner" : {
"login" : "Rickster5555" ,
"id" : 92229061 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/92229061?v=4" ,
"html_url" : "https:\/\/github.com\/Rickster5555"
} ,
"html_url" : "https:\/\/github.com\/Rickster5555\/EH2-PoC" ,
"description" : "A simple PoC for CVE-2022-46169 a.k.a Cacti Unauthenticated Command Injection, a vulnerability allows an unauthenticated user to execute arbitrary code on a server running Cacti prior from version 1.2.17 to 1.2.22" ,
"fork" : false ,
"created_at" : "2023-05-12T19:08:45Z" ,
"updated_at" : "2023-05-12T19:29:22Z" ,
2023-05-15 08:35:47 +02:00
"pushed_at" : "2023-05-15T02:36:24Z" ,
2023-05-12 08:39:36 +02:00
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
2023-05-15 08:35:47 +02:00
"forks_count" : 2 ,
2023-05-12 08:39:36 +02:00
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
2023-05-15 08:35:47 +02:00
"forks" : 2 ,
2023-05-12 08:39:36 +02:00
"watchers" : 0 ,
2023-06-19 15:46:37 +02:00
"score" : 0 ,
"subscribers_count" : 1
2023-05-21 14:29:58 +02:00
} ,
{
"id" : 643437445 ,
"name" : "CVE-2022-46169" ,
"full_name" : "antisecc\/CVE-2022-46169" ,
"owner" : {
"login" : "antisecc" ,
"id" : 92209707 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/92209707?v=4" ,
"html_url" : "https:\/\/github.com\/antisecc"
} ,
"html_url" : "https:\/\/github.com\/antisecc\/CVE-2022-46169" ,
"description" : null ,
"fork" : false ,
"created_at" : "2023-05-21T06:43:17Z" ,
"updated_at" : "2023-05-21T06:44:18Z" ,
"pushed_at" : "2023-05-21T06:48:04Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
2023-05-22 08:29:20 +02:00
"forks_count" : 1 ,
2023-05-21 14:29:58 +02:00
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
2023-05-22 08:29:20 +02:00
"forks" : 1 ,
2023-05-21 14:29:58 +02:00
"watchers" : 0 ,
2023-06-19 15:46:37 +02:00
"score" : 0 ,
2023-07-06 08:36:07 +02:00
"subscribers_count" : 1
2023-08-01 16:07:11 +02:00
} ,
{
"id" : 673282845 ,
"name" : "CVE-2022-46169" ,
2023-09-17 20:26:07 +02:00
"full_name" : "dawnl3ss\/CVE-2022-46169" ,
2023-08-01 16:07:11 +02:00
"owner" : {
2023-09-17 20:26:07 +02:00
"login" : "dawnl3ss" ,
2023-08-01 16:07:11 +02:00
"id" : 52249849 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/52249849?v=4" ,
2023-09-17 20:26:07 +02:00
"html_url" : "https:\/\/github.com\/dawnl3ss"
2023-08-01 16:07:11 +02:00
} ,
2023-09-17 20:26:07 +02:00
"html_url" : "https:\/\/github.com\/dawnl3ss\/CVE-2022-46169" ,
2023-08-01 16:07:11 +02:00
"description" : "Unauthenticated Command Injection in Cacti <= 1.2.22" ,
"fork" : false ,
"created_at" : "2023-08-01T09:29:30Z" ,
"updated_at" : "2023-08-01T09:30:11Z" ,
"pushed_at" : "2023-08-01T09:31:07Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 1 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 1 ,
"watchers" : 0 ,
"score" : 0 ,
2023-08-02 08:32:14 +02:00
"subscribers_count" : 1
2023-08-30 20:44:25 +02:00
} ,
{
"id" : 685095951 ,
"name" : "CVE-2022-46169" ,
"full_name" : "a1665454764\/CVE-2022-46169" ,
"owner" : {
"login" : "a1665454764" ,
"id" : 143511005 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/143511005?v=4" ,
"html_url" : "https:\/\/github.com\/a1665454764"
} ,
"html_url" : "https:\/\/github.com\/a1665454764\/CVE-2022-46169" ,
"description" : "CVE-2022-46169" ,
"fork" : false ,
"created_at" : "2023-08-30T14:03:41Z" ,
2023-11-09 07:37:24 +01:00
"updated_at" : "2023-11-09T02:46:53Z" ,
2023-08-30 20:44:25 +02:00
"pushed_at" : "2023-08-30T14:06:31Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
2023-08-31 08:39:21 +02:00
"subscribers_count" : 1
2023-09-10 08:32:41 +02:00
} ,
{
"id" : 689539220 ,
"name" : "CVE-2022-46169-Exploit" ,
"full_name" : "0xZon\/CVE-2022-46169-Exploit" ,
"owner" : {
"login" : "0xZon" ,
"id" : 52760493 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/52760493?v=4" ,
"html_url" : "https:\/\/github.com\/0xZon"
} ,
"html_url" : "https:\/\/github.com\/0xZon\/CVE-2022-46169-Exploit" ,
"description" : null ,
"fork" : false ,
"created_at" : "2023-09-10T06:03:22Z" ,
"updated_at" : "2023-09-10T06:03:53Z" ,
"pushed_at" : "2023-09-10T06:28:04Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
2023-09-11 08:36:49 +02:00
"subscribers_count" : 1
2023-09-10 20:26:51 +02:00
} ,
{
"id" : 689709304 ,
"name" : "PricklyPwn" ,
"full_name" : "copyleftdev\/PricklyPwn" ,
"owner" : {
"login" : "copyleftdev" ,
"id" : 11798 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/11798?v=4" ,
"html_url" : "https:\/\/github.com\/copyleftdev"
} ,
"html_url" : "https:\/\/github.com\/copyleftdev\/PricklyPwn" ,
"description" : "An advanced RCE tool tailored for exploiting a vulnerability in Cacti v1.2.22. Crafted with precision, this utility aids security researchers in analyzing and understanding the depth of the CVE-2022-46169 flaw. Use responsibly and ethically." ,
"fork" : false ,
"created_at" : "2023-09-10T17:00:50Z" ,
2024-04-29 08:30:41 +02:00
"updated_at" : "2024-04-29T05:12:05Z" ,
2023-09-10 20:26:51 +02:00
"pushed_at" : "2023-09-10T17:14:08Z" ,
2024-02-13 01:26:09 +01:00
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
2023-09-10 20:26:51 +02:00
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [
"cacti" ,
"command-injection" ,
"cve-2022-46169" ,
"cybersecurity" ,
"ethical-hacking" ,
"exploitation-tool" ,
"payload" ,
"penetration-testing" ,
"rce" ,
"remote-command-execution" ,
"reverse-shell" ,
"security" ,
"vulnerability-assessment"
] ,
"visibility" : "public" ,
"forks" : 0 ,
2024-02-13 01:26:09 +01:00
"watchers" : 1 ,
2023-09-10 20:26:51 +02:00
"score" : 0 ,
2024-01-22 07:50:31 +01:00
"subscribers_count" : 2
2023-11-23 19:33:04 +01:00
} ,
{
"id" : 722684867 ,
"name" : "CVE-2022-46169" ,
"full_name" : "0xN7y\/CVE-2022-46169" ,
"owner" : {
"login" : "0xN7y" ,
"id" : 70061541 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/70061541?v=4" ,
"html_url" : "https:\/\/github.com\/0xN7y"
} ,
"html_url" : "https:\/\/github.com\/0xN7y\/CVE-2022-46169" ,
"description" : "Exploit for CVE-2022-46169 " ,
"fork" : false ,
"created_at" : "2023-11-23T17:36:20Z" ,
2023-11-24 07:29:58 +01:00
"updated_at" : "2023-11-24T04:38:07Z" ,
2023-12-07 13:32:15 +01:00
"pushed_at" : "2023-12-07T08:02:51Z" ,
2023-11-24 07:29:58 +01:00
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
2023-11-23 19:33:04 +01:00
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
2023-11-24 07:29:58 +01:00
"watchers" : 1 ,
2023-11-23 19:33:04 +01:00
"score" : 0 ,
2023-11-24 07:29:58 +01:00
"subscribers_count" : 1
2024-03-29 01:26:36 +01:00
} ,
{
"id" : 778972816 ,
"name" : "CVE-2022-46169" ,
"full_name" : "mind2hex\/CVE-2022-46169" ,
"owner" : {
"login" : "mind2hex" ,
"id" : 51345640 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/51345640?v=4" ,
"html_url" : "https:\/\/github.com\/mind2hex"
} ,
"html_url" : "https:\/\/github.com\/mind2hex\/CVE-2022-46169" ,
"description" : null ,
"fork" : false ,
"created_at" : "2024-03-28T19:23:56Z" ,
"updated_at" : "2024-03-28T19:44:04Z" ,
"pushed_at" : "2024-03-28T19:24:54Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
2024-03-29 07:26:37 +01:00
"subscribers_count" : 1
2023-01-02 13:13:52 +01:00
}
]