2024-11-29 03:31:51 +09:00
[
{
"id" : 575289853 ,
"name" : "CVE-2022-46169" ,
"full_name" : "imjdl\/CVE-2022-46169" ,
"owner" : {
"login" : "imjdl" ,
"id" : 31382943 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/31382943?v=4" ,
"html_url" : "https:\/\/github.com\/imjdl" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/imjdl\/CVE-2022-46169" ,
"description" : "CVE-2022-46169" ,
"fork" : false ,
"created_at" : "2022-12-07T07:11:23Z" ,
"updated_at" : "2023-03-28T06:17:46Z" ,
"pushed_at" : "2022-12-07T07:17:37Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 0
} ,
{
"id" : 575651169 ,
"name" : "CVE-2022-46169" ,
"full_name" : "0xf4n9x\/CVE-2022-46169" ,
"owner" : {
"login" : "0xf4n9x" ,
"id" : 40891670 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/40891670?v=4" ,
"html_url" : "https:\/\/github.com\/0xf4n9x" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/0xf4n9x\/CVE-2022-46169" ,
"description" : "CVE-2022-46169 Cacti remote_agent.php Unauthenticated Command Injection." ,
"fork" : false ,
"created_at" : "2022-12-08T01:52:13Z" ,
"updated_at" : "2024-10-30T03:43:51Z" ,
"pushed_at" : "2022-12-08T02:50:46Z" ,
"stargazers_count" : 49 ,
"watchers_count" : 49 ,
"has_discussions" : false ,
"forks_count" : 12 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 12 ,
"watchers" : 49 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 579086902 ,
"name" : "CVE-2022-46169" ,
"full_name" : "taythebot\/CVE-2022-46169" ,
"owner" : {
"login" : "taythebot" ,
"id" : 60461479 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/60461479?v=4" ,
"html_url" : "https:\/\/github.com\/taythebot" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/taythebot\/CVE-2022-46169" ,
"description" : "CVE-2022-46169 - Cacti Blind Remote Code Execution (Pre-Auth)" ,
"fork" : false ,
"created_at" : "2022-12-16T16:16:35Z" ,
"updated_at" : "2023-01-05T21:32:10Z" ,
"pushed_at" : "2022-12-16T16:53:51Z" ,
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
"has_discussions" : false ,
"forks_count" : 2 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 2 ,
"watchers" : 1 ,
"score" : 0 ,
"subscribers_count" : 2
} ,
{
"id" : 584490516 ,
"name" : "CVE-2022-46169" ,
"full_name" : "Inplex-sys\/CVE-2022-46169" ,
"owner" : {
"login" : "Inplex-sys" ,
"id" : 69421356 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/69421356?v=4" ,
"html_url" : "https:\/\/github.com\/Inplex-sys" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/Inplex-sys\/CVE-2022-46169" ,
"description" : "Cacti Unauthenticated Command Injection" ,
"fork" : false ,
"created_at" : "2023-01-02T18:03:26Z" ,
"updated_at" : "2023-03-11T00:41:32Z" ,
"pushed_at" : "2023-01-02T18:05:45Z" ,
"stargazers_count" : 3 ,
"watchers_count" : 3 ,
"has_discussions" : false ,
"forks_count" : 2 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [
"cacti" ,
"cve" ,
"hgrab-framework" ,
"poc" ,
"rce" ,
"scanner" ,
"vulnerability"
] ,
"visibility" : "public" ,
"forks" : 2 ,
"watchers" : 3 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 585629170 ,
"name" : "CVE-2022-46169" ,
"full_name" : "sAsPeCt488\/CVE-2022-46169" ,
"owner" : {
"login" : "sAsPeCt488" ,
"id" : 55363474 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/55363474?v=4" ,
"html_url" : "https:\/\/github.com\/sAsPeCt488" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/sAsPeCt488\/CVE-2022-46169" ,
"description" : "PoC for CVE-2022-46169 - Unauthenticated RCE on Cacti <= 1.2.22" ,
"fork" : false ,
"created_at" : "2023-01-05T16:56:06Z" ,
2024-11-30 21:31:42 +09:00
"updated_at" : "2024-11-30T08:26:52Z" ,
2024-11-29 03:31:51 +09:00
"pushed_at" : "2023-05-05T18:06:58Z" ,
2024-11-30 21:31:42 +09:00
"stargazers_count" : 30 ,
"watchers_count" : 30 ,
2024-11-29 03:31:51 +09:00
"has_discussions" : false ,
"forks_count" : 8 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [
"cacti" ,
"cve-2022-46169" ,
"poc"
] ,
"visibility" : "public" ,
"forks" : 8 ,
2024-11-30 21:31:42 +09:00
"watchers" : 30 ,
2024-11-29 03:31:51 +09:00
"score" : 0 ,
"subscribers_count" : 2
} ,
{
"id" : 588437634 ,
"name" : "CVE-2022-46169" ,
"full_name" : "c3rrberu5\/CVE-2022-46169" ,
"owner" : {
"login" : "c3rrberu5" ,
"id" : 109983457 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/109983457?v=4" ,
"html_url" : "https:\/\/github.com\/c3rrberu5" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/c3rrberu5\/CVE-2022-46169" ,
"description" : "Exploit to CVE-2022-46169 vulnerability" ,
"fork" : false ,
"created_at" : "2023-01-13T05:37:56Z" ,
"updated_at" : "2024-06-06T21:53:35Z" ,
"pushed_at" : "2023-01-16T23:14:04Z" ,
"stargazers_count" : 10 ,
"watchers_count" : 10 ,
"has_discussions" : false ,
"forks_count" : 6 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 6 ,
"watchers" : 10 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 589360535 ,
"name" : "CVE-2022-46169" ,
"full_name" : "Habib0x0\/CVE-2022-46169" ,
"owner" : {
"login" : "Habib0x0" ,
"id" : 24976957 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/24976957?v=4" ,
"html_url" : "https:\/\/github.com\/Habib0x0" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/Habib0x0\/CVE-2022-46169" ,
"description" : "Cacti: Unauthenticated Remote Code Execution Exploit in Ruby " ,
"fork" : false ,
"created_at" : "2023-01-15T22:46:52Z" ,
"updated_at" : "2023-02-13T09:30:29Z" ,
"pushed_at" : "2023-01-20T07:10:39Z" ,
"stargazers_count" : 2 ,
"watchers_count" : 2 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 2 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 589524043 ,
"name" : "CVE-2022-46169_POC" ,
"full_name" : "N1arut\/CVE-2022-46169_POC" ,
"owner" : {
"login" : "N1arut" ,
"id" : 41994914 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/41994914?v=4" ,
"html_url" : "https:\/\/github.com\/N1arut" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/N1arut\/CVE-2022-46169_POC" ,
"description" : "RCE POC for CVE-2022-46169" ,
"fork" : false ,
"created_at" : "2023-01-16T10:21:26Z" ,
"updated_at" : "2023-10-08T20:21:44Z" ,
"pushed_at" : "2023-01-17T16:32:46Z" ,
"stargazers_count" : 3 ,
"watchers_count" : 3 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 3 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 596690527 ,
"name" : "CVE-2022-46169" ,
"full_name" : "miko550\/CVE-2022-46169" ,
"owner" : {
"login" : "miko550" ,
"id" : 83682793 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/83682793?v=4" ,
"html_url" : "https:\/\/github.com\/miko550" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/miko550\/CVE-2022-46169" ,
"description" : null ,
"fork" : false ,
"created_at" : "2023-02-02T18:21:08Z" ,
"updated_at" : "2023-02-02T18:25:02Z" ,
"pushed_at" : "2023-02-02T18:42:54Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 612724556 ,
"name" : "cacti-cve-2022-46169-exploit" ,
"full_name" : "ariyaadinatha\/cacti-cve-2022-46169-exploit" ,
"owner" : {
"login" : "ariyaadinatha" ,
"id" : 54601298 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/54601298?v=4" ,
"html_url" : "https:\/\/github.com\/ariyaadinatha" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/ariyaadinatha\/cacti-cve-2022-46169-exploit" ,
"description" : "This is poc of CVE-2022-46169 authentication bypass and remote code execution" ,
"fork" : false ,
"created_at" : "2023-03-11T19:39:44Z" ,
"updated_at" : "2023-11-22T00:03:33Z" ,
"pushed_at" : "2023-05-18T19:06:36Z" ,
"stargazers_count" : 16 ,
"watchers_count" : 16 ,
"has_discussions" : false ,
"forks_count" : 5 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 5 ,
"watchers" : 16 ,
"score" : 0 ,
"subscribers_count" : 2
} ,
{
"id" : 616701865 ,
"name" : "CVE-2022-46169" ,
"full_name" : "doosec101\/CVE-2022-46169" ,
"owner" : {
"login" : "doosec101" ,
"id" : 128431701 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/128431701?v=4" ,
"html_url" : "https:\/\/github.com\/doosec101" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/doosec101\/CVE-2022-46169" ,
"description" : "Repo for CVE-2022-46169" ,
"fork" : false ,
"created_at" : "2023-03-20T22:54:18Z" ,
"updated_at" : "2023-03-20T23:57:27Z" ,
"pushed_at" : "2023-03-21T04:56:18Z" ,
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
"has_discussions" : false ,
"forks_count" : 1 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 1 ,
"watchers" : 1 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 622325901 ,
"name" : "cacti-rce-cve-2022-46169-vulnerable-application" ,
"full_name" : "m3ssap0\/cacti-rce-cve-2022-46169-vulnerable-application" ,
"owner" : {
"login" : "m3ssap0" ,
"id" : 705120 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/705120?v=4" ,
"html_url" : "https:\/\/github.com\/m3ssap0" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/m3ssap0\/cacti-rce-cve-2022-46169-vulnerable-application" ,
"description" : "WARNING: This is a vulnerable application to test the exploit for the Cacti command injection (CVE-2022-46169). Run it at your own risk!" ,
"fork" : false ,
"created_at" : "2023-04-01T19:20:29Z" ,
"updated_at" : "2023-09-22T17:23:40Z" ,
"pushed_at" : "2023-04-03T11:01:24Z" ,
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
"has_discussions" : false ,
"forks_count" : 2 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [
"cacti" ,
"command-injection" ,
"cve-2022-46169" ,
"rce" ,
"vulnerable-application"
] ,
"visibility" : "public" ,
"forks" : 2 ,
"watchers" : 1 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 622368239 ,
"name" : "CVE-2022-46169_poc" ,
"full_name" : "devAL3X\/CVE-2022-46169_poc" ,
"owner" : {
"login" : "devAL3X" ,
"id" : 40294005 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/40294005?v=4" ,
"html_url" : "https:\/\/github.com\/devAL3X" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/devAL3X\/CVE-2022-46169_poc" ,
"description" : null ,
"fork" : false ,
"created_at" : "2023-04-01T22:37:37Z" ,
"updated_at" : "2023-04-01T22:37:46Z" ,
"pushed_at" : "2023-04-13T15:18:53Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 625050292 ,
"name" : "CVE-2022-46169_unauth_remote_code_execution" ,
"full_name" : "JacobEbben\/CVE-2022-46169_unauth_remote_code_execution" ,
"owner" : {
"login" : "JacobEbben" ,
"id" : 112503338 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/112503338?v=4" ,
"html_url" : "https:\/\/github.com\/JacobEbben" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/JacobEbben\/CVE-2022-46169_unauth_remote_code_execution" ,
"description" : "Unauthenticated Remote Code Execution through authentication bypass and command injection in Cacti < 1.2.23 and < 1.3.0" ,
"fork" : false ,
"created_at" : "2023-04-07T23:40:53Z" ,
"updated_at" : "2023-05-13T16:45:25Z" ,
"pushed_at" : "2023-04-09T11:02:59Z" ,
"stargazers_count" : 3 ,
"watchers_count" : 3 ,
"has_discussions" : false ,
"forks_count" : 1 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 1 ,
"watchers" : 3 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 627335815 ,
"name" : "CVE-2022-46169" ,
"full_name" : "icebreack\/CVE-2022-46169" ,
"owner" : {
"login" : "icebreack" ,
"id" : 6855402 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/6855402?v=4" ,
"html_url" : "https:\/\/github.com\/icebreack" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/icebreack\/CVE-2022-46169" ,
"description" : "Fixed exploit for CVE-2022-46169 (originally from https:\/\/www.exploit-db.com\/exploits\/51166)" ,
"fork" : false ,
"created_at" : "2023-04-13T08:55:08Z" ,
"updated_at" : "2023-04-14T17:26:04Z" ,
"pushed_at" : "2023-04-13T08:55:51Z" ,
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 1 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 634367688 ,
"name" : "CVE-2022-46169" ,
"full_name" : "devilgothies\/CVE-2022-46169" ,
"owner" : {
"login" : "devilgothies" ,
"id" : 104858033 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/104858033?v=4" ,
"html_url" : "https:\/\/github.com\/devilgothies" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/devilgothies\/CVE-2022-46169" ,
"description" : "PoC for CVE-2022-46169 that affects Cacti 1.2.22 version" ,
"fork" : false ,
"created_at" : "2023-04-29T22:14:17Z" ,
"updated_at" : "2023-04-29T22:28:21Z" ,
"pushed_at" : "2023-04-29T22:25:25Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [
"cacti" ,
"cve-2022-46169" ,
"poc" ,
"rce"
] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 634502064 ,
"name" : "CVE-2022-46169" ,
"full_name" : "yassinebk\/CVE-2022-46169" ,
"owner" : {
"login" : "yassinebk" ,
"id" : 62627838 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/62627838?v=4" ,
"html_url" : "https:\/\/github.com\/yassinebk" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/yassinebk\/CVE-2022-46169" ,
"description" : "CVE-2022-46169" ,
"fork" : false ,
"created_at" : "2023-04-30T10:37:44Z" ,
"updated_at" : "2023-04-30T10:37:52Z" ,
"pushed_at" : "2023-04-30T10:37:49Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 634912432 ,
"name" : "CVE-2022-46169" ,
"full_name" : "ruycr4ft\/CVE-2022-46169" ,
"owner" : {
"login" : "ruycr4ft" ,
"id" : 103446004 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/103446004?v=4" ,
"html_url" : "https:\/\/github.com\/ruycr4ft" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/ruycr4ft\/CVE-2022-46169" ,
"description" : "Exploit for cacti version 1.2.22" ,
"fork" : false ,
"created_at" : "2023-05-01T14:29:28Z" ,
"updated_at" : "2023-10-11T14:48:00Z" ,
"pushed_at" : "2023-10-11T14:48:53Z" ,
"stargazers_count" : 2 ,
"watchers_count" : 2 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 2 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 635027757 ,
"name" : "CVE-2022-46169-CACTI-1.2.22" ,
"full_name" : "FredBrave\/CVE-2022-46169-CACTI-1.2.22" ,
"owner" : {
"login" : "FredBrave" ,
"id" : 114189847 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/114189847?v=4" ,
"html_url" : "https:\/\/github.com\/FredBrave" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/FredBrave\/CVE-2022-46169-CACTI-1.2.22" ,
"description" : "This is a exploit of CVE-2022-46169 to cacti 1.2.22. This exploit allows through an RCE to obtain a reverse shell on your computer." ,
"fork" : false ,
"created_at" : "2023-05-01T20:00:23Z" ,
2024-12-05 09:32:14 +09:00
"updated_at" : "2024-12-04T19:11:59Z" ,
2024-11-29 03:31:51 +09:00
"pushed_at" : "2023-09-11T17:56:27Z" ,
2024-12-05 09:32:14 +09:00
"stargazers_count" : 39 ,
"watchers_count" : 39 ,
2024-11-29 03:31:51 +09:00
"has_discussions" : false ,
"forks_count" : 8 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 8 ,
2024-12-05 09:32:14 +09:00
"watchers" : 39 ,
2024-11-29 03:31:51 +09:00
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 635123796 ,
"name" : "RCE-Cacti-1.2.22" ,
"full_name" : "sha-16\/RCE-Cacti-1.2.22" ,
"owner" : {
"login" : "sha-16" ,
"id" : 89037170 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/89037170?v=4" ,
"html_url" : "https:\/\/github.com\/sha-16" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/sha-16\/RCE-Cacti-1.2.22" ,
"description" : "Este es un código del exploit CVE-2022-46169, que recree utilizando Python3! Si por ahí estás haciendo una máquina de HTB, esto te puede ser útil... 🤞✨ " ,
"fork" : false ,
"created_at" : "2023-05-02T02:41:44Z" ,
"updated_at" : "2024-10-31T16:23:19Z" ,
"pushed_at" : "2023-05-02T03:36:03Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 635433764 ,
"name" : "CVE-2022-46169" ,
"full_name" : "Safarchand\/CVE-2022-46169" ,
"owner" : {
"login" : "Safarchand" ,
"id" : 38681779 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/38681779?v=4" ,
"html_url" : "https:\/\/github.com\/Safarchand" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/Safarchand\/CVE-2022-46169" ,
"description" : "Improved PoC for Unauthenticated RCE on Cacti <= 1.2.22 - CVE-2022-46169" ,
"fork" : false ,
"created_at" : "2023-05-02T17:26:11Z" ,
"updated_at" : "2023-05-04T17:07:23Z" ,
"pushed_at" : "2023-05-02T17:50:20Z" ,
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
"has_discussions" : false ,
"forks_count" : 1 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [
"cacti-rce" ,
"cve-2022-46169" ,
"poc" ,
"rce"
] ,
"visibility" : "public" ,
"forks" : 1 ,
"watchers" : 1 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 635946571 ,
"name" : "CVE-2022-46169" ,
"full_name" : "MarkStrendin\/CVE-2022-46169" ,
"owner" : {
"login" : "MarkStrendin" ,
"id" : 638560 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/638560?v=4" ,
"html_url" : "https:\/\/github.com\/MarkStrendin" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/MarkStrendin\/CVE-2022-46169" ,
"description" : "Proof of concept \/ CTF script for exploiting CVE-2022-46169 in Cacti, versions >=1.2.22" ,
"fork" : false ,
"created_at" : "2023-05-03T19:53:01Z" ,
"updated_at" : "2023-05-03T19:54:22Z" ,
"pushed_at" : "2023-05-03T19:56:59Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 1 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 1 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 636441307 ,
"name" : "CVE-2022-46169" ,
"full_name" : "BKreisel\/CVE-2022-46169" ,
"owner" : {
"login" : "BKreisel" ,
"id" : 1513073 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/1513073?v=4" ,
"html_url" : "https:\/\/github.com\/BKreisel" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/BKreisel\/CVE-2022-46169" ,
"description" : "🐍 Python Exploit for CVE-2022-46169" ,
"fork" : false ,
"created_at" : "2023-05-04T21:21:05Z" ,
"updated_at" : "2023-05-04T22:04:32Z" ,
"pushed_at" : "2023-05-04T22:03:20Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [
"cve" ,
"cve-2022-46169" ,
"exploit" ,
"python"
] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 2
} ,
{
"id" : 640014872 ,
"name" : "EH2-PoC" ,
"full_name" : "Rickster5555\/EH2-PoC" ,
"owner" : {
"login" : "Rickster5555" ,
"id" : 92229061 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/92229061?v=4" ,
"html_url" : "https:\/\/github.com\/Rickster5555" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/Rickster5555\/EH2-PoC" ,
"description" : "A simple PoC for CVE-2022-46169 a.k.a Cacti Unauthenticated Command Injection, a vulnerability allows an unauthenticated user to execute arbitrary code on a server running Cacti prior from version 1.2.17 to 1.2.22" ,
"fork" : false ,
"created_at" : "2023-05-12T19:08:45Z" ,
"updated_at" : "2023-05-12T19:29:22Z" ,
"pushed_at" : "2023-05-15T02:36:24Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 2 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 2 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 643437445 ,
"name" : "CVE-2022-46169" ,
"full_name" : "antisecc\/CVE-2022-46169" ,
"owner" : {
"login" : "antisecc" ,
"id" : 92209707 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/92209707?v=4" ,
"html_url" : "https:\/\/github.com\/antisecc" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/antisecc\/CVE-2022-46169" ,
"description" : null ,
"fork" : false ,
"created_at" : "2023-05-21T06:43:17Z" ,
"updated_at" : "2023-05-21T06:44:18Z" ,
"pushed_at" : "2023-05-21T06:48:04Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 1 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 1 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 673282845 ,
"name" : "CVE-2022-46169" ,
"full_name" : "dawnl3ss\/CVE-2022-46169" ,
"owner" : {
"login" : "dawnl3ss" ,
"id" : 52249849 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/52249849?v=4" ,
"html_url" : "https:\/\/github.com\/dawnl3ss" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/dawnl3ss\/CVE-2022-46169" ,
"description" : "Unauthenticated Command Injection in Cacti <= 1.2.22" ,
"fork" : false ,
"created_at" : "2023-08-01T09:29:30Z" ,
"updated_at" : "2023-08-01T09:30:11Z" ,
"pushed_at" : "2023-08-01T09:31:07Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 1 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 1 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 685095951 ,
"name" : "CVE-2022-46169" ,
"full_name" : "a1665454764\/CVE-2022-46169" ,
"owner" : {
"login" : "a1665454764" ,
"id" : 143511005 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/143511005?v=4" ,
"html_url" : "https:\/\/github.com\/a1665454764" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/a1665454764\/CVE-2022-46169" ,
"description" : "CVE-2022-46169" ,
"fork" : false ,
"created_at" : "2023-08-30T14:03:41Z" ,
"updated_at" : "2023-11-09T02:46:53Z" ,
"pushed_at" : "2023-08-30T14:06:31Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 689539220 ,
"name" : "CVE-2022-46169-Exploit" ,
"full_name" : "0xZon\/CVE-2022-46169-Exploit" ,
"owner" : {
"login" : "0xZon" ,
"id" : 52760493 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/52760493?v=4" ,
"html_url" : "https:\/\/github.com\/0xZon" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/0xZon\/CVE-2022-46169-Exploit" ,
"description" : null ,
"fork" : false ,
"created_at" : "2023-09-10T06:03:22Z" ,
"updated_at" : "2023-09-10T06:03:53Z" ,
"pushed_at" : "2023-09-10T06:28:04Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 689709304 ,
"name" : "PricklyPwn" ,
"full_name" : "copyleftdev\/PricklyPwn" ,
"owner" : {
"login" : "copyleftdev" ,
"id" : 11798 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/11798?v=4" ,
"html_url" : "https:\/\/github.com\/copyleftdev" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/copyleftdev\/PricklyPwn" ,
"description" : "An advanced RCE tool tailored for exploiting a vulnerability in Cacti v1.2.22. Crafted with precision, this utility aids security researchers in analyzing and understanding the depth of the CVE-2022-46169 flaw. Use responsibly and ethically." ,
"fork" : false ,
"created_at" : "2023-09-10T17:00:50Z" ,
"updated_at" : "2024-04-29T05:12:05Z" ,
"pushed_at" : "2023-09-10T17:14:08Z" ,
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [
"cacti" ,
"command-injection" ,
"cve-2022-46169" ,
"cybersecurity" ,
"ethical-hacking" ,
"exploitation-tool" ,
"payload" ,
"penetration-testing" ,
"rce" ,
"remote-command-execution" ,
"reverse-shell" ,
"security" ,
"vulnerability-assessment"
] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 1 ,
"score" : 0 ,
"subscribers_count" : 2
} ,
{
"id" : 722684867 ,
"name" : "CVE-2022-46169" ,
"full_name" : "0xN7y\/CVE-2022-46169" ,
"owner" : {
"login" : "0xN7y" ,
"id" : 70061541 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/70061541?v=4" ,
"html_url" : "https:\/\/github.com\/0xN7y" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/0xN7y\/CVE-2022-46169" ,
"description" : "Exploit for CVE-2022-46169 " ,
"fork" : false ,
"created_at" : "2023-11-23T17:36:20Z" ,
"updated_at" : "2023-11-24T04:38:07Z" ,
"pushed_at" : "2023-12-07T08:02:51Z" ,
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 1 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 778972816 ,
"name" : "CVE-2022-46169" ,
"full_name" : "mind2hex\/CVE-2022-46169" ,
"owner" : {
"login" : "mind2hex" ,
"id" : 51345640 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/51345640?v=4" ,
"html_url" : "https:\/\/github.com\/mind2hex" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/mind2hex\/CVE-2022-46169" ,
"description" : null ,
"fork" : false ,
"created_at" : "2024-03-28T19:23:56Z" ,
"updated_at" : "2024-03-28T19:44:04Z" ,
"pushed_at" : "2024-03-28T19:24:54Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 814041598 ,
"name" : "CVE-2022-46169" ,
"full_name" : "HPT-Intern-Task-Submission\/CVE-2022-46169" ,
"owner" : {
"login" : "HPT-Intern-Task-Submission" ,
"id" : 169382051 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/169382051?v=4" ,
"html_url" : "https:\/\/github.com\/HPT-Intern-Task-Submission" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/HPT-Intern-Task-Submission\/CVE-2022-46169" ,
"description" : null ,
"fork" : false ,
"created_at" : "2024-06-12T08:24:30Z" ,
"updated_at" : "2024-06-14T03:02:02Z" ,
"pushed_at" : "2024-06-14T03:01:59Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 0
}
]