[ { "id": 575651169, "name": "CVE-2022-46169", "full_name": "0xf4n9x\/CVE-2022-46169", "owner": { "login": "0xf4n9x", "id": 40891670, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/40891670?v=4", "html_url": "https:\/\/github.com\/0xf4n9x" }, "html_url": "https:\/\/github.com\/0xf4n9x\/CVE-2022-46169", "description": "CVE-2022-46169 Cacti remote_agent.php Unauthenticated Command Injection.", "fork": false, "created_at": "2022-12-08T01:52:13Z", "updated_at": "2023-01-11T03:33:44Z", "pushed_at": "2022-12-08T02:50:46Z", "stargazers_count": 40, "watchers_count": 40, "has_discussions": false, "forks_count": 11, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 11, "watchers": 40, "score": 0 }, { "id": 579086902, "name": "CVE-2022-46169", "full_name": "taythebot\/CVE-2022-46169", "owner": { "login": "taythebot", "id": 60461479, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/60461479?v=4", "html_url": "https:\/\/github.com\/taythebot" }, "html_url": "https:\/\/github.com\/taythebot\/CVE-2022-46169", "description": "CVE-2022-46169 - Cacti Blind Remote Code Execution (Pre-Auth)", "fork": false, "created_at": "2022-12-16T16:16:35Z", "updated_at": "2023-01-05T21:32:10Z", "pushed_at": "2022-12-16T16:53:51Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 2, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 2, "watchers": 1, "score": 0 }, { "id": 584490516, "name": "CVE-2022-46169", "full_name": "Inplex-sys\/CVE-2022-46169", "owner": { "login": "Inplex-sys", "id": 69421356, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/69421356?v=4", "html_url": "https:\/\/github.com\/Inplex-sys" }, "html_url": "https:\/\/github.com\/Inplex-sys\/CVE-2022-46169", "description": "Cacti Unauthenticated Command Injection", "fork": false, "created_at": "2023-01-02T18:03:26Z", "updated_at": "2023-01-03T10:29:20Z", "pushed_at": "2023-01-02T18:05:45Z", "stargazers_count": 2, "watchers_count": 2, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "cacti", "cve", "hgrab-framework", "poc", "rce", "scanner", "vulnerability" ], "visibility": "public", "forks": 1, "watchers": 2, "score": 0 }, { "id": 585629170, "name": "CVE-2022-46169", "full_name": "sAsPeCt488\/CVE-2022-46169", "owner": { "login": "sAsPeCt488", "id": 55363474, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/55363474?v=4", "html_url": "https:\/\/github.com\/sAsPeCt488" }, "html_url": "https:\/\/github.com\/sAsPeCt488\/CVE-2022-46169", "description": "PoC for CVE-2022-46169 - Unauthenticated RCE on Cacti <= 1.2.22", "fork": false, "created_at": "2023-01-05T16:56:06Z", "updated_at": "2023-01-06T06:18:35Z", "pushed_at": "2023-01-06T01:30:33Z", "stargazers_count": 8, "watchers_count": 8, "has_discussions": false, "forks_count": 3, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "cacti", "cve-2022-46169" ], "visibility": "public", "forks": 3, "watchers": 8, "score": 0 } ]