PoC-in-GitHub/2022/CVE-2022-46169.json
2023-01-29 03:29:30 +09:00

216 lines
No EOL
7.2 KiB
JSON

[
{
"id": 575651169,
"name": "CVE-2022-46169",
"full_name": "0xf4n9x\/CVE-2022-46169",
"owner": {
"login": "0xf4n9x",
"id": 40891670,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/40891670?v=4",
"html_url": "https:\/\/github.com\/0xf4n9x"
},
"html_url": "https:\/\/github.com\/0xf4n9x\/CVE-2022-46169",
"description": "CVE-2022-46169 Cacti remote_agent.php Unauthenticated Command Injection.",
"fork": false,
"created_at": "2022-12-08T01:52:13Z",
"updated_at": "2023-01-16T12:48:47Z",
"pushed_at": "2022-12-08T02:50:46Z",
"stargazers_count": 44,
"watchers_count": 44,
"has_discussions": false,
"forks_count": 11,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 11,
"watchers": 44,
"score": 0
},
{
"id": 579086902,
"name": "CVE-2022-46169",
"full_name": "taythebot\/CVE-2022-46169",
"owner": {
"login": "taythebot",
"id": 60461479,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/60461479?v=4",
"html_url": "https:\/\/github.com\/taythebot"
},
"html_url": "https:\/\/github.com\/taythebot\/CVE-2022-46169",
"description": "CVE-2022-46169 - Cacti Blind Remote Code Execution (Pre-Auth)",
"fork": false,
"created_at": "2022-12-16T16:16:35Z",
"updated_at": "2023-01-05T21:32:10Z",
"pushed_at": "2022-12-16T16:53:51Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 1,
"score": 0
},
{
"id": 584490516,
"name": "CVE-2022-46169",
"full_name": "Inplex-sys\/CVE-2022-46169",
"owner": {
"login": "Inplex-sys",
"id": 69421356,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/69421356?v=4",
"html_url": "https:\/\/github.com\/Inplex-sys"
},
"html_url": "https:\/\/github.com\/Inplex-sys\/CVE-2022-46169",
"description": "Cacti Unauthenticated Command Injection",
"fork": false,
"created_at": "2023-01-02T18:03:26Z",
"updated_at": "2023-01-14T11:59:05Z",
"pushed_at": "2023-01-02T18:05:45Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cacti",
"cve",
"hgrab-framework",
"poc",
"rce",
"scanner",
"vulnerability"
],
"visibility": "public",
"forks": 2,
"watchers": 2,
"score": 0
},
{
"id": 585629170,
"name": "CVE-2022-46169",
"full_name": "sAsPeCt488\/CVE-2022-46169",
"owner": {
"login": "sAsPeCt488",
"id": 55363474,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/55363474?v=4",
"html_url": "https:\/\/github.com\/sAsPeCt488"
},
"html_url": "https:\/\/github.com\/sAsPeCt488\/CVE-2022-46169",
"description": "PoC for CVE-2022-46169 - Unauthenticated RCE on Cacti <= 1.2.22",
"fork": false,
"created_at": "2023-01-05T16:56:06Z",
"updated_at": "2023-01-17T17:36:56Z",
"pushed_at": "2023-01-28T15:15:28Z",
"stargazers_count": 9,
"watchers_count": 9,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cacti",
"cve-2022-46169"
],
"visibility": "public",
"forks": 4,
"watchers": 9,
"score": 0
},
{
"id": 588437634,
"name": "CVE-2022-46169",
"full_name": "Anthonyc3rb3ru5\/CVE-2022-46169",
"owner": {
"login": "Anthonyc3rb3ru5",
"id": 109983457,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/109983457?v=4",
"html_url": "https:\/\/github.com\/Anthonyc3rb3ru5"
},
"html_url": "https:\/\/github.com\/Anthonyc3rb3ru5\/CVE-2022-46169",
"description": "Exploit to CVE-2022-46169 vulnerability",
"fork": false,
"created_at": "2023-01-13T05:37:56Z",
"updated_at": "2023-01-16T08:31:55Z",
"pushed_at": "2023-01-16T23:14:04Z",
"stargazers_count": 6,
"watchers_count": 6,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 6,
"score": 0
},
{
"id": 589360535,
"name": "CVE-2022-46169",
"full_name": "hab1b0x\/CVE-2022-46169",
"owner": {
"login": "hab1b0x",
"id": 24976957,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/24976957?v=4",
"html_url": "https:\/\/github.com\/hab1b0x"
},
"html_url": "https:\/\/github.com\/hab1b0x\/CVE-2022-46169",
"description": "Cacti: Unauthenticated Remote Code Execution Exploit in Ruby ",
"fork": false,
"created_at": "2023-01-15T22:46:52Z",
"updated_at": "2023-01-17T17:43:57Z",
"pushed_at": "2023-01-20T07:10:39Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 589524043,
"name": "CVE-2022-46169_POC",
"full_name": "N1arut\/CVE-2022-46169_POC",
"owner": {
"login": "N1arut",
"id": 41994914,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/41994914?v=4",
"html_url": "https:\/\/github.com\/N1arut"
},
"html_url": "https:\/\/github.com\/N1arut\/CVE-2022-46169_POC",
"description": "RCE POC for CVE-2022-46169",
"fork": false,
"created_at": "2023-01-16T10:21:26Z",
"updated_at": "2023-01-16T11:33:15Z",
"pushed_at": "2023-01-17T16:32:46Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0
}
]