mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
1072 lines
No EOL
37 KiB
JSON
1072 lines
No EOL
37 KiB
JSON
[
|
|
{
|
|
"id": 575289853,
|
|
"name": "CVE-2022-46169",
|
|
"full_name": "imjdl\/CVE-2022-46169",
|
|
"owner": {
|
|
"login": "imjdl",
|
|
"id": 31382943,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31382943?v=4",
|
|
"html_url": "https:\/\/github.com\/imjdl",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/imjdl\/CVE-2022-46169",
|
|
"description": "CVE-2022-46169",
|
|
"fork": false,
|
|
"created_at": "2022-12-07T07:11:23Z",
|
|
"updated_at": "2023-03-28T06:17:46Z",
|
|
"pushed_at": "2022-12-07T07:17:37Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"has_discussions": false,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0,
|
|
"subscribers_count": 0
|
|
},
|
|
{
|
|
"id": 575651169,
|
|
"name": "CVE-2022-46169",
|
|
"full_name": "0xf4n9x\/CVE-2022-46169",
|
|
"owner": {
|
|
"login": "0xf4n9x",
|
|
"id": 40891670,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/40891670?v=4",
|
|
"html_url": "https:\/\/github.com\/0xf4n9x",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/0xf4n9x\/CVE-2022-46169",
|
|
"description": "CVE-2022-46169 Cacti remote_agent.php Unauthenticated Command Injection.",
|
|
"fork": false,
|
|
"created_at": "2022-12-08T01:52:13Z",
|
|
"updated_at": "2024-10-30T03:43:51Z",
|
|
"pushed_at": "2022-12-08T02:50:46Z",
|
|
"stargazers_count": 49,
|
|
"watchers_count": 49,
|
|
"has_discussions": false,
|
|
"forks_count": 12,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 12,
|
|
"watchers": 49,
|
|
"score": 0,
|
|
"subscribers_count": 1
|
|
},
|
|
{
|
|
"id": 579086902,
|
|
"name": "CVE-2022-46169",
|
|
"full_name": "taythebot\/CVE-2022-46169",
|
|
"owner": {
|
|
"login": "taythebot",
|
|
"id": 60461479,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/60461479?v=4",
|
|
"html_url": "https:\/\/github.com\/taythebot",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/taythebot\/CVE-2022-46169",
|
|
"description": "CVE-2022-46169 - Cacti Blind Remote Code Execution (Pre-Auth)",
|
|
"fork": false,
|
|
"created_at": "2022-12-16T16:16:35Z",
|
|
"updated_at": "2023-01-05T21:32:10Z",
|
|
"pushed_at": "2022-12-16T16:53:51Z",
|
|
"stargazers_count": 1,
|
|
"watchers_count": 1,
|
|
"has_discussions": false,
|
|
"forks_count": 2,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 2,
|
|
"watchers": 1,
|
|
"score": 0,
|
|
"subscribers_count": 2
|
|
},
|
|
{
|
|
"id": 584490516,
|
|
"name": "CVE-2022-46169",
|
|
"full_name": "Inplex-sys\/CVE-2022-46169",
|
|
"owner": {
|
|
"login": "Inplex-sys",
|
|
"id": 69421356,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/69421356?v=4",
|
|
"html_url": "https:\/\/github.com\/Inplex-sys",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/Inplex-sys\/CVE-2022-46169",
|
|
"description": "Cacti Unauthenticated Command Injection",
|
|
"fork": false,
|
|
"created_at": "2023-01-02T18:03:26Z",
|
|
"updated_at": "2023-03-11T00:41:32Z",
|
|
"pushed_at": "2023-01-02T18:05:45Z",
|
|
"stargazers_count": 3,
|
|
"watchers_count": 3,
|
|
"has_discussions": false,
|
|
"forks_count": 2,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [
|
|
"cacti",
|
|
"cve",
|
|
"hgrab-framework",
|
|
"poc",
|
|
"rce",
|
|
"scanner",
|
|
"vulnerability"
|
|
],
|
|
"visibility": "public",
|
|
"forks": 2,
|
|
"watchers": 3,
|
|
"score": 0,
|
|
"subscribers_count": 1
|
|
},
|
|
{
|
|
"id": 585629170,
|
|
"name": "CVE-2022-46169",
|
|
"full_name": "sAsPeCt488\/CVE-2022-46169",
|
|
"owner": {
|
|
"login": "sAsPeCt488",
|
|
"id": 55363474,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/55363474?v=4",
|
|
"html_url": "https:\/\/github.com\/sAsPeCt488",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/sAsPeCt488\/CVE-2022-46169",
|
|
"description": "PoC for CVE-2022-46169 - Unauthenticated RCE on Cacti <= 1.2.22",
|
|
"fork": false,
|
|
"created_at": "2023-01-05T16:56:06Z",
|
|
"updated_at": "2025-01-03T17:25:08Z",
|
|
"pushed_at": "2023-05-05T18:06:58Z",
|
|
"stargazers_count": 29,
|
|
"watchers_count": 29,
|
|
"has_discussions": false,
|
|
"forks_count": 8,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [
|
|
"cacti",
|
|
"cve-2022-46169",
|
|
"poc"
|
|
],
|
|
"visibility": "public",
|
|
"forks": 8,
|
|
"watchers": 29,
|
|
"score": 0,
|
|
"subscribers_count": 2
|
|
},
|
|
{
|
|
"id": 588437634,
|
|
"name": "CVE-2022-46169",
|
|
"full_name": "c3rrberu5\/CVE-2022-46169",
|
|
"owner": {
|
|
"login": "c3rrberu5",
|
|
"id": 109983457,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/109983457?v=4",
|
|
"html_url": "https:\/\/github.com\/c3rrberu5",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/c3rrberu5\/CVE-2022-46169",
|
|
"description": "Exploit to CVE-2022-46169 vulnerability",
|
|
"fork": false,
|
|
"created_at": "2023-01-13T05:37:56Z",
|
|
"updated_at": "2024-06-06T21:53:35Z",
|
|
"pushed_at": "2023-01-16T23:14:04Z",
|
|
"stargazers_count": 10,
|
|
"watchers_count": 10,
|
|
"has_discussions": false,
|
|
"forks_count": 6,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 6,
|
|
"watchers": 10,
|
|
"score": 0,
|
|
"subscribers_count": 1
|
|
},
|
|
{
|
|
"id": 589360535,
|
|
"name": "CVE-2022-46169",
|
|
"full_name": "Habib0x0\/CVE-2022-46169",
|
|
"owner": {
|
|
"login": "Habib0x0",
|
|
"id": 24976957,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/24976957?v=4",
|
|
"html_url": "https:\/\/github.com\/Habib0x0",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/Habib0x0\/CVE-2022-46169",
|
|
"description": "Cacti: Unauthenticated Remote Code Execution Exploit in Ruby ",
|
|
"fork": false,
|
|
"created_at": "2023-01-15T22:46:52Z",
|
|
"updated_at": "2023-02-13T09:30:29Z",
|
|
"pushed_at": "2023-01-20T07:10:39Z",
|
|
"stargazers_count": 2,
|
|
"watchers_count": 2,
|
|
"has_discussions": false,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 2,
|
|
"score": 0,
|
|
"subscribers_count": 1
|
|
},
|
|
{
|
|
"id": 589524043,
|
|
"name": "CVE-2022-46169_POC",
|
|
"full_name": "N1arut\/CVE-2022-46169_POC",
|
|
"owner": {
|
|
"login": "N1arut",
|
|
"id": 41994914,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/41994914?v=4",
|
|
"html_url": "https:\/\/github.com\/N1arut",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/N1arut\/CVE-2022-46169_POC",
|
|
"description": "RCE POC for CVE-2022-46169",
|
|
"fork": false,
|
|
"created_at": "2023-01-16T10:21:26Z",
|
|
"updated_at": "2023-10-08T20:21:44Z",
|
|
"pushed_at": "2023-01-17T16:32:46Z",
|
|
"stargazers_count": 3,
|
|
"watchers_count": 3,
|
|
"has_discussions": false,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 3,
|
|
"score": 0,
|
|
"subscribers_count": 1
|
|
},
|
|
{
|
|
"id": 596690527,
|
|
"name": "CVE-2022-46169",
|
|
"full_name": "miko550\/CVE-2022-46169",
|
|
"owner": {
|
|
"login": "miko550",
|
|
"id": 83682793,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/83682793?v=4",
|
|
"html_url": "https:\/\/github.com\/miko550",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/miko550\/CVE-2022-46169",
|
|
"description": null,
|
|
"fork": false,
|
|
"created_at": "2023-02-02T18:21:08Z",
|
|
"updated_at": "2023-02-02T18:25:02Z",
|
|
"pushed_at": "2023-02-02T18:42:54Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"has_discussions": false,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0,
|
|
"subscribers_count": 1
|
|
},
|
|
{
|
|
"id": 612724556,
|
|
"name": "cacti-cve-2022-46169-exploit",
|
|
"full_name": "ariyaadinatha\/cacti-cve-2022-46169-exploit",
|
|
"owner": {
|
|
"login": "ariyaadinatha",
|
|
"id": 54601298,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/54601298?v=4",
|
|
"html_url": "https:\/\/github.com\/ariyaadinatha",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/ariyaadinatha\/cacti-cve-2022-46169-exploit",
|
|
"description": "This is poc of CVE-2022-46169 authentication bypass and remote code execution",
|
|
"fork": false,
|
|
"created_at": "2023-03-11T19:39:44Z",
|
|
"updated_at": "2023-11-22T00:03:33Z",
|
|
"pushed_at": "2023-05-18T19:06:36Z",
|
|
"stargazers_count": 16,
|
|
"watchers_count": 16,
|
|
"has_discussions": false,
|
|
"forks_count": 5,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 5,
|
|
"watchers": 16,
|
|
"score": 0,
|
|
"subscribers_count": 2
|
|
},
|
|
{
|
|
"id": 616701865,
|
|
"name": "CVE-2022-46169",
|
|
"full_name": "doosec101\/CVE-2022-46169",
|
|
"owner": {
|
|
"login": "doosec101",
|
|
"id": 128431701,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/128431701?v=4",
|
|
"html_url": "https:\/\/github.com\/doosec101",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/doosec101\/CVE-2022-46169",
|
|
"description": "Repo for CVE-2022-46169",
|
|
"fork": false,
|
|
"created_at": "2023-03-20T22:54:18Z",
|
|
"updated_at": "2023-03-20T23:57:27Z",
|
|
"pushed_at": "2023-03-21T04:56:18Z",
|
|
"stargazers_count": 1,
|
|
"watchers_count": 1,
|
|
"has_discussions": false,
|
|
"forks_count": 1,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 1,
|
|
"watchers": 1,
|
|
"score": 0,
|
|
"subscribers_count": 1
|
|
},
|
|
{
|
|
"id": 622325901,
|
|
"name": "cacti-rce-cve-2022-46169-vulnerable-application",
|
|
"full_name": "m3ssap0\/cacti-rce-cve-2022-46169-vulnerable-application",
|
|
"owner": {
|
|
"login": "m3ssap0",
|
|
"id": 705120,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/705120?v=4",
|
|
"html_url": "https:\/\/github.com\/m3ssap0",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/m3ssap0\/cacti-rce-cve-2022-46169-vulnerable-application",
|
|
"description": "WARNING: This is a vulnerable application to test the exploit for the Cacti command injection (CVE-2022-46169). Run it at your own risk!",
|
|
"fork": false,
|
|
"created_at": "2023-04-01T19:20:29Z",
|
|
"updated_at": "2023-09-22T17:23:40Z",
|
|
"pushed_at": "2023-04-03T11:01:24Z",
|
|
"stargazers_count": 1,
|
|
"watchers_count": 1,
|
|
"has_discussions": false,
|
|
"forks_count": 2,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [
|
|
"cacti",
|
|
"command-injection",
|
|
"cve-2022-46169",
|
|
"rce",
|
|
"vulnerable-application"
|
|
],
|
|
"visibility": "public",
|
|
"forks": 2,
|
|
"watchers": 1,
|
|
"score": 0,
|
|
"subscribers_count": 1
|
|
},
|
|
{
|
|
"id": 622368239,
|
|
"name": "CVE-2022-46169_poc",
|
|
"full_name": "devAL3X\/CVE-2022-46169_poc",
|
|
"owner": {
|
|
"login": "devAL3X",
|
|
"id": 40294005,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/40294005?v=4",
|
|
"html_url": "https:\/\/github.com\/devAL3X",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/devAL3X\/CVE-2022-46169_poc",
|
|
"description": null,
|
|
"fork": false,
|
|
"created_at": "2023-04-01T22:37:37Z",
|
|
"updated_at": "2023-04-01T22:37:46Z",
|
|
"pushed_at": "2023-04-13T15:18:53Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"has_discussions": false,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0,
|
|
"subscribers_count": 1
|
|
},
|
|
{
|
|
"id": 625050292,
|
|
"name": "CVE-2022-46169_unauth_remote_code_execution",
|
|
"full_name": "JacobEbben\/CVE-2022-46169_unauth_remote_code_execution",
|
|
"owner": {
|
|
"login": "JacobEbben",
|
|
"id": 112503338,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/112503338?v=4",
|
|
"html_url": "https:\/\/github.com\/JacobEbben",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/JacobEbben\/CVE-2022-46169_unauth_remote_code_execution",
|
|
"description": "Unauthenticated Remote Code Execution through authentication bypass and command injection in Cacti < 1.2.23 and < 1.3.0",
|
|
"fork": false,
|
|
"created_at": "2023-04-07T23:40:53Z",
|
|
"updated_at": "2023-05-13T16:45:25Z",
|
|
"pushed_at": "2023-04-09T11:02:59Z",
|
|
"stargazers_count": 3,
|
|
"watchers_count": 3,
|
|
"has_discussions": false,
|
|
"forks_count": 1,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 1,
|
|
"watchers": 3,
|
|
"score": 0,
|
|
"subscribers_count": 1
|
|
},
|
|
{
|
|
"id": 627335815,
|
|
"name": "CVE-2022-46169",
|
|
"full_name": "icebreack\/CVE-2022-46169",
|
|
"owner": {
|
|
"login": "icebreack",
|
|
"id": 6855402,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6855402?v=4",
|
|
"html_url": "https:\/\/github.com\/icebreack",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/icebreack\/CVE-2022-46169",
|
|
"description": "Fixed exploit for CVE-2022-46169 (originally from https:\/\/www.exploit-db.com\/exploits\/51166)",
|
|
"fork": false,
|
|
"created_at": "2023-04-13T08:55:08Z",
|
|
"updated_at": "2023-04-14T17:26:04Z",
|
|
"pushed_at": "2023-04-13T08:55:51Z",
|
|
"stargazers_count": 1,
|
|
"watchers_count": 1,
|
|
"has_discussions": false,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 1,
|
|
"score": 0,
|
|
"subscribers_count": 1
|
|
},
|
|
{
|
|
"id": 634367688,
|
|
"name": "CVE-2022-46169",
|
|
"full_name": "devilgothies\/CVE-2022-46169",
|
|
"owner": {
|
|
"login": "devilgothies",
|
|
"id": 104858033,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/104858033?v=4",
|
|
"html_url": "https:\/\/github.com\/devilgothies",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/devilgothies\/CVE-2022-46169",
|
|
"description": "PoC for CVE-2022-46169 that affects Cacti 1.2.22 version",
|
|
"fork": false,
|
|
"created_at": "2023-04-29T22:14:17Z",
|
|
"updated_at": "2023-04-29T22:28:21Z",
|
|
"pushed_at": "2023-04-29T22:25:25Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"has_discussions": false,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [
|
|
"cacti",
|
|
"cve-2022-46169",
|
|
"poc",
|
|
"rce"
|
|
],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0,
|
|
"subscribers_count": 1
|
|
},
|
|
{
|
|
"id": 634502064,
|
|
"name": "CVE-2022-46169",
|
|
"full_name": "yassinebk\/CVE-2022-46169",
|
|
"owner": {
|
|
"login": "yassinebk",
|
|
"id": 62627838,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/62627838?v=4",
|
|
"html_url": "https:\/\/github.com\/yassinebk",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/yassinebk\/CVE-2022-46169",
|
|
"description": "CVE-2022-46169",
|
|
"fork": false,
|
|
"created_at": "2023-04-30T10:37:44Z",
|
|
"updated_at": "2023-04-30T10:37:52Z",
|
|
"pushed_at": "2023-04-30T10:37:49Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"has_discussions": false,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0,
|
|
"subscribers_count": 1
|
|
},
|
|
{
|
|
"id": 634912432,
|
|
"name": "CVE-2022-46169",
|
|
"full_name": "ruycr4ft\/CVE-2022-46169",
|
|
"owner": {
|
|
"login": "ruycr4ft",
|
|
"id": 103446004,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/103446004?v=4",
|
|
"html_url": "https:\/\/github.com\/ruycr4ft",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/ruycr4ft\/CVE-2022-46169",
|
|
"description": "Exploit for cacti version 1.2.22",
|
|
"fork": false,
|
|
"created_at": "2023-05-01T14:29:28Z",
|
|
"updated_at": "2023-10-11T14:48:00Z",
|
|
"pushed_at": "2023-10-11T14:48:53Z",
|
|
"stargazers_count": 2,
|
|
"watchers_count": 2,
|
|
"has_discussions": false,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 2,
|
|
"score": 0,
|
|
"subscribers_count": 1
|
|
},
|
|
{
|
|
"id": 635027757,
|
|
"name": "CVE-2022-46169-CACTI-1.2.22",
|
|
"full_name": "FredBrave\/CVE-2022-46169-CACTI-1.2.22",
|
|
"owner": {
|
|
"login": "FredBrave",
|
|
"id": 114189847,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/114189847?v=4",
|
|
"html_url": "https:\/\/github.com\/FredBrave",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/FredBrave\/CVE-2022-46169-CACTI-1.2.22",
|
|
"description": "This is a exploit of CVE-2022-46169 to cacti 1.2.22. This exploit allows through an RCE to obtain a reverse shell on your computer.",
|
|
"fork": false,
|
|
"created_at": "2023-05-01T20:00:23Z",
|
|
"updated_at": "2025-01-02T07:46:28Z",
|
|
"pushed_at": "2023-09-11T17:56:27Z",
|
|
"stargazers_count": 40,
|
|
"watchers_count": 40,
|
|
"has_discussions": false,
|
|
"forks_count": 8,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 8,
|
|
"watchers": 40,
|
|
"score": 0,
|
|
"subscribers_count": 1
|
|
},
|
|
{
|
|
"id": 635123796,
|
|
"name": "RCE-Cacti-1.2.22",
|
|
"full_name": "sha-16\/RCE-Cacti-1.2.22",
|
|
"owner": {
|
|
"login": "sha-16",
|
|
"id": 89037170,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/89037170?v=4",
|
|
"html_url": "https:\/\/github.com\/sha-16",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/sha-16\/RCE-Cacti-1.2.22",
|
|
"description": "Este es un código del exploit CVE-2022-46169, que recree utilizando Python3! Si por ahí estás haciendo una máquina de HTB, esto te puede ser útil... 🤞✨ ",
|
|
"fork": false,
|
|
"created_at": "2023-05-02T02:41:44Z",
|
|
"updated_at": "2024-10-31T16:23:19Z",
|
|
"pushed_at": "2023-05-02T03:36:03Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"has_discussions": false,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0,
|
|
"subscribers_count": 1
|
|
},
|
|
{
|
|
"id": 635433764,
|
|
"name": "CVE-2022-46169",
|
|
"full_name": "Safarchand\/CVE-2022-46169",
|
|
"owner": {
|
|
"login": "Safarchand",
|
|
"id": 38681779,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38681779?v=4",
|
|
"html_url": "https:\/\/github.com\/Safarchand",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/Safarchand\/CVE-2022-46169",
|
|
"description": "Improved PoC for Unauthenticated RCE on Cacti <= 1.2.22 - CVE-2022-46169",
|
|
"fork": false,
|
|
"created_at": "2023-05-02T17:26:11Z",
|
|
"updated_at": "2023-05-04T17:07:23Z",
|
|
"pushed_at": "2023-05-02T17:50:20Z",
|
|
"stargazers_count": 1,
|
|
"watchers_count": 1,
|
|
"has_discussions": false,
|
|
"forks_count": 1,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [
|
|
"cacti-rce",
|
|
"cve-2022-46169",
|
|
"poc",
|
|
"rce"
|
|
],
|
|
"visibility": "public",
|
|
"forks": 1,
|
|
"watchers": 1,
|
|
"score": 0,
|
|
"subscribers_count": 1
|
|
},
|
|
{
|
|
"id": 635946571,
|
|
"name": "CVE-2022-46169",
|
|
"full_name": "MarkStrendin\/CVE-2022-46169",
|
|
"owner": {
|
|
"login": "MarkStrendin",
|
|
"id": 638560,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/638560?v=4",
|
|
"html_url": "https:\/\/github.com\/MarkStrendin",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/MarkStrendin\/CVE-2022-46169",
|
|
"description": "Proof of concept \/ CTF script for exploiting CVE-2022-46169 in Cacti, versions >=1.2.22",
|
|
"fork": false,
|
|
"created_at": "2023-05-03T19:53:01Z",
|
|
"updated_at": "2023-05-03T19:54:22Z",
|
|
"pushed_at": "2023-05-03T19:56:59Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"has_discussions": false,
|
|
"forks_count": 1,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 1,
|
|
"watchers": 0,
|
|
"score": 0,
|
|
"subscribers_count": 1
|
|
},
|
|
{
|
|
"id": 636441307,
|
|
"name": "CVE-2022-46169",
|
|
"full_name": "BKreisel\/CVE-2022-46169",
|
|
"owner": {
|
|
"login": "BKreisel",
|
|
"id": 1513073,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1513073?v=4",
|
|
"html_url": "https:\/\/github.com\/BKreisel",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/BKreisel\/CVE-2022-46169",
|
|
"description": "🐍 Python Exploit for CVE-2022-46169",
|
|
"fork": false,
|
|
"created_at": "2023-05-04T21:21:05Z",
|
|
"updated_at": "2023-05-04T22:04:32Z",
|
|
"pushed_at": "2023-05-04T22:03:20Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"has_discussions": false,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [
|
|
"cve",
|
|
"cve-2022-46169",
|
|
"exploit",
|
|
"python"
|
|
],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0,
|
|
"subscribers_count": 2
|
|
},
|
|
{
|
|
"id": 640014872,
|
|
"name": "EH2-PoC",
|
|
"full_name": "Rickster5555\/EH2-PoC",
|
|
"owner": {
|
|
"login": "Rickster5555",
|
|
"id": 92229061,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/92229061?v=4",
|
|
"html_url": "https:\/\/github.com\/Rickster5555",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/Rickster5555\/EH2-PoC",
|
|
"description": "A simple PoC for CVE-2022-46169 a.k.a Cacti Unauthenticated Command Injection, a vulnerability allows an unauthenticated user to execute arbitrary code on a server running Cacti prior from version 1.2.17 to 1.2.22",
|
|
"fork": false,
|
|
"created_at": "2023-05-12T19:08:45Z",
|
|
"updated_at": "2023-05-12T19:29:22Z",
|
|
"pushed_at": "2023-05-15T02:36:24Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"has_discussions": false,
|
|
"forks_count": 2,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 2,
|
|
"watchers": 0,
|
|
"score": 0,
|
|
"subscribers_count": 1
|
|
},
|
|
{
|
|
"id": 643437445,
|
|
"name": "CVE-2022-46169",
|
|
"full_name": "antisecc\/CVE-2022-46169",
|
|
"owner": {
|
|
"login": "antisecc",
|
|
"id": 92209707,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/92209707?v=4",
|
|
"html_url": "https:\/\/github.com\/antisecc",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/antisecc\/CVE-2022-46169",
|
|
"description": null,
|
|
"fork": false,
|
|
"created_at": "2023-05-21T06:43:17Z",
|
|
"updated_at": "2023-05-21T06:44:18Z",
|
|
"pushed_at": "2023-05-21T06:48:04Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"has_discussions": false,
|
|
"forks_count": 1,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 1,
|
|
"watchers": 0,
|
|
"score": 0,
|
|
"subscribers_count": 1
|
|
},
|
|
{
|
|
"id": 673282845,
|
|
"name": "CVE-2022-46169",
|
|
"full_name": "dawnl3ss\/CVE-2022-46169",
|
|
"owner": {
|
|
"login": "dawnl3ss",
|
|
"id": 52249849,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/52249849?v=4",
|
|
"html_url": "https:\/\/github.com\/dawnl3ss",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/dawnl3ss\/CVE-2022-46169",
|
|
"description": "Unauthenticated Command Injection in Cacti <= 1.2.22",
|
|
"fork": false,
|
|
"created_at": "2023-08-01T09:29:30Z",
|
|
"updated_at": "2023-08-01T09:30:11Z",
|
|
"pushed_at": "2023-08-01T09:31:07Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"has_discussions": false,
|
|
"forks_count": 1,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 1,
|
|
"watchers": 0,
|
|
"score": 0,
|
|
"subscribers_count": 1
|
|
},
|
|
{
|
|
"id": 685095951,
|
|
"name": "CVE-2022-46169",
|
|
"full_name": "a1665454764\/CVE-2022-46169",
|
|
"owner": {
|
|
"login": "a1665454764",
|
|
"id": 143511005,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/143511005?v=4",
|
|
"html_url": "https:\/\/github.com\/a1665454764",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/a1665454764\/CVE-2022-46169",
|
|
"description": "CVE-2022-46169",
|
|
"fork": false,
|
|
"created_at": "2023-08-30T14:03:41Z",
|
|
"updated_at": "2023-11-09T02:46:53Z",
|
|
"pushed_at": "2023-08-30T14:06:31Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"has_discussions": false,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0,
|
|
"subscribers_count": 1
|
|
},
|
|
{
|
|
"id": 689539220,
|
|
"name": "CVE-2022-46169-Exploit",
|
|
"full_name": "0xZon\/CVE-2022-46169-Exploit",
|
|
"owner": {
|
|
"login": "0xZon",
|
|
"id": 52760493,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/52760493?v=4",
|
|
"html_url": "https:\/\/github.com\/0xZon",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/0xZon\/CVE-2022-46169-Exploit",
|
|
"description": null,
|
|
"fork": false,
|
|
"created_at": "2023-09-10T06:03:22Z",
|
|
"updated_at": "2023-09-10T06:03:53Z",
|
|
"pushed_at": "2023-09-10T06:28:04Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"has_discussions": false,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0,
|
|
"subscribers_count": 1
|
|
},
|
|
{
|
|
"id": 689709304,
|
|
"name": "PricklyPwn",
|
|
"full_name": "copyleftdev\/PricklyPwn",
|
|
"owner": {
|
|
"login": "copyleftdev",
|
|
"id": 11798,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11798?v=4",
|
|
"html_url": "https:\/\/github.com\/copyleftdev",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/copyleftdev\/PricklyPwn",
|
|
"description": "An advanced RCE tool tailored for exploiting a vulnerability in Cacti v1.2.22. Crafted with precision, this utility aids security researchers in analyzing and understanding the depth of the CVE-2022-46169 flaw. Use responsibly and ethically.",
|
|
"fork": false,
|
|
"created_at": "2023-09-10T17:00:50Z",
|
|
"updated_at": "2024-04-29T05:12:05Z",
|
|
"pushed_at": "2023-09-10T17:14:08Z",
|
|
"stargazers_count": 1,
|
|
"watchers_count": 1,
|
|
"has_discussions": false,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [
|
|
"cacti",
|
|
"command-injection",
|
|
"cve-2022-46169",
|
|
"cybersecurity",
|
|
"ethical-hacking",
|
|
"exploitation-tool",
|
|
"payload",
|
|
"penetration-testing",
|
|
"rce",
|
|
"remote-command-execution",
|
|
"reverse-shell",
|
|
"security",
|
|
"vulnerability-assessment"
|
|
],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 1,
|
|
"score": 0,
|
|
"subscribers_count": 2
|
|
},
|
|
{
|
|
"id": 722684867,
|
|
"name": "CVE-2022-46169",
|
|
"full_name": "0xN7y\/CVE-2022-46169",
|
|
"owner": {
|
|
"login": "0xN7y",
|
|
"id": 70061541,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/70061541?v=4",
|
|
"html_url": "https:\/\/github.com\/0xN7y",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/0xN7y\/CVE-2022-46169",
|
|
"description": "Exploit for CVE-2022-46169 ",
|
|
"fork": false,
|
|
"created_at": "2023-11-23T17:36:20Z",
|
|
"updated_at": "2023-11-24T04:38:07Z",
|
|
"pushed_at": "2023-12-07T08:02:51Z",
|
|
"stargazers_count": 1,
|
|
"watchers_count": 1,
|
|
"has_discussions": false,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 1,
|
|
"score": 0,
|
|
"subscribers_count": 1
|
|
},
|
|
{
|
|
"id": 778972816,
|
|
"name": "CVE-2022-46169",
|
|
"full_name": "mind2hex\/CVE-2022-46169",
|
|
"owner": {
|
|
"login": "mind2hex",
|
|
"id": 51345640,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51345640?v=4",
|
|
"html_url": "https:\/\/github.com\/mind2hex",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/mind2hex\/CVE-2022-46169",
|
|
"description": null,
|
|
"fork": false,
|
|
"created_at": "2024-03-28T19:23:56Z",
|
|
"updated_at": "2024-03-28T19:44:04Z",
|
|
"pushed_at": "2024-03-28T19:24:54Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"has_discussions": false,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0,
|
|
"subscribers_count": 1
|
|
},
|
|
{
|
|
"id": 814041598,
|
|
"name": "CVE-2022-46169",
|
|
"full_name": "HPT-Intern-Task-Submission\/CVE-2022-46169",
|
|
"owner": {
|
|
"login": "HPT-Intern-Task-Submission",
|
|
"id": 169382051,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/169382051?v=4",
|
|
"html_url": "https:\/\/github.com\/HPT-Intern-Task-Submission",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/HPT-Intern-Task-Submission\/CVE-2022-46169",
|
|
"description": null,
|
|
"fork": false,
|
|
"created_at": "2024-06-12T08:24:30Z",
|
|
"updated_at": "2024-06-14T03:02:02Z",
|
|
"pushed_at": "2024-06-14T03:01:59Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"has_discussions": false,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0,
|
|
"subscribers_count": 0
|
|
},
|
|
{
|
|
"id": 912195951,
|
|
"name": "CVE-2022-46169",
|
|
"full_name": "lof1sec\/CVE-2022-46169",
|
|
"owner": {
|
|
"login": "lof1sec",
|
|
"id": 105061690,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/105061690?v=4",
|
|
"html_url": "https:\/\/github.com\/lof1sec",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/lof1sec\/CVE-2022-46169",
|
|
"description": "Cacti v1.2.22: Unauthenticated Command Injection Vulnerability (CVE-2022-46169)",
|
|
"fork": false,
|
|
"created_at": "2025-01-04T21:53:47Z",
|
|
"updated_at": "2025-01-06T11:49:57Z",
|
|
"pushed_at": "2025-01-06T11:49:54Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"has_discussions": false,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0,
|
|
"subscribers_count": 1
|
|
}
|
|
] |