mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-09-14 05:12:12 +02:00
295 lines
No EOL
10 KiB
JSON
295 lines
No EOL
10 KiB
JSON
[
|
|
{
|
|
"id": 634912432,
|
|
"name": "CVE-2022-46169",
|
|
"full_name": "ruycr4ft\/CVE-2022-46169",
|
|
"owner": {
|
|
"login": "ruycr4ft",
|
|
"id": 103446004,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/103446004?v=4",
|
|
"html_url": "https:\/\/github.com\/ruycr4ft",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/ruycr4ft\/CVE-2022-46169",
|
|
"description": "Exploit for cacti version 1.2.22",
|
|
"fork": false,
|
|
"created_at": "2023-05-01T14:29:28Z",
|
|
"updated_at": "2023-10-11T14:48:00Z",
|
|
"pushed_at": "2023-10-11T14:48:53Z",
|
|
"stargazers_count": 2,
|
|
"watchers_count": 2,
|
|
"has_discussions": false,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 2,
|
|
"score": 0,
|
|
"subscribers_count": 1
|
|
},
|
|
{
|
|
"id": 635027757,
|
|
"name": "CVE-2022-46169-CACTI-1.2.22",
|
|
"full_name": "FredBrave\/CVE-2022-46169-CACTI-1.2.22",
|
|
"owner": {
|
|
"login": "FredBrave",
|
|
"id": 114189847,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/114189847?v=4",
|
|
"html_url": "https:\/\/github.com\/FredBrave",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/FredBrave\/CVE-2022-46169-CACTI-1.2.22",
|
|
"description": "This is a exploit of CVE-2022-46169 to cacti 1.2.22. This exploit allows through an RCE to obtain a reverse shell on your computer.",
|
|
"fork": false,
|
|
"created_at": "2023-05-01T20:00:23Z",
|
|
"updated_at": "2025-02-07T16:50:01Z",
|
|
"pushed_at": "2023-09-11T17:56:27Z",
|
|
"stargazers_count": 41,
|
|
"watchers_count": 41,
|
|
"has_discussions": false,
|
|
"forks_count": 8,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 8,
|
|
"watchers": 41,
|
|
"score": 0,
|
|
"subscribers_count": 1
|
|
},
|
|
{
|
|
"id": 685095951,
|
|
"name": "CVE-2022-46169",
|
|
"full_name": "a1665454764\/CVE-2022-46169",
|
|
"owner": {
|
|
"login": "a1665454764",
|
|
"id": 143511005,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/143511005?v=4",
|
|
"html_url": "https:\/\/github.com\/a1665454764",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/a1665454764\/CVE-2022-46169",
|
|
"description": "CVE-2022-46169",
|
|
"fork": false,
|
|
"created_at": "2023-08-30T14:03:41Z",
|
|
"updated_at": "2023-11-09T02:46:53Z",
|
|
"pushed_at": "2023-08-30T14:06:31Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"has_discussions": false,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0,
|
|
"subscribers_count": 1
|
|
},
|
|
{
|
|
"id": 689539220,
|
|
"name": "CVE-2022-46169-Exploit",
|
|
"full_name": "0xZon\/CVE-2022-46169-Exploit",
|
|
"owner": {
|
|
"login": "0xZon",
|
|
"id": 52760493,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/52760493?v=4",
|
|
"html_url": "https:\/\/github.com\/0xZon",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/0xZon\/CVE-2022-46169-Exploit",
|
|
"description": null,
|
|
"fork": false,
|
|
"created_at": "2023-09-10T06:03:22Z",
|
|
"updated_at": "2023-09-10T06:03:53Z",
|
|
"pushed_at": "2023-09-10T06:28:04Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"has_discussions": false,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0,
|
|
"subscribers_count": 1
|
|
},
|
|
{
|
|
"id": 689709304,
|
|
"name": "PricklyPwn",
|
|
"full_name": "copyleftdev\/PricklyPwn",
|
|
"owner": {
|
|
"login": "copyleftdev",
|
|
"id": 11798,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11798?v=4",
|
|
"html_url": "https:\/\/github.com\/copyleftdev",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/copyleftdev\/PricklyPwn",
|
|
"description": "An advanced RCE tool tailored for exploiting a vulnerability in Cacti v1.2.22. Crafted with precision, this utility aids security researchers in analyzing and understanding the depth of the CVE-2022-46169 flaw. Use responsibly and ethically.",
|
|
"fork": false,
|
|
"created_at": "2023-09-10T17:00:50Z",
|
|
"updated_at": "2024-04-29T05:12:05Z",
|
|
"pushed_at": "2023-09-10T17:14:08Z",
|
|
"stargazers_count": 1,
|
|
"watchers_count": 1,
|
|
"has_discussions": false,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [
|
|
"cacti",
|
|
"command-injection",
|
|
"cve-2022-46169",
|
|
"cybersecurity",
|
|
"ethical-hacking",
|
|
"exploitation-tool",
|
|
"payload",
|
|
"penetration-testing",
|
|
"rce",
|
|
"remote-command-execution",
|
|
"reverse-shell",
|
|
"security",
|
|
"vulnerability-assessment"
|
|
],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 1,
|
|
"score": 0,
|
|
"subscribers_count": 2
|
|
},
|
|
{
|
|
"id": 722684867,
|
|
"name": "CVE-2022-46169",
|
|
"full_name": "0xN7y\/CVE-2022-46169",
|
|
"owner": {
|
|
"login": "0xN7y",
|
|
"id": 70061541,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/70061541?v=4",
|
|
"html_url": "https:\/\/github.com\/0xN7y",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/0xN7y\/CVE-2022-46169",
|
|
"description": "Exploit for CVE-2022-46169 ",
|
|
"fork": false,
|
|
"created_at": "2023-11-23T17:36:20Z",
|
|
"updated_at": "2023-11-24T04:38:07Z",
|
|
"pushed_at": "2023-12-07T08:02:51Z",
|
|
"stargazers_count": 1,
|
|
"watchers_count": 1,
|
|
"has_discussions": false,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 1,
|
|
"score": 0,
|
|
"subscribers_count": 1
|
|
},
|
|
{
|
|
"id": 778972816,
|
|
"name": "CVE-2022-46169",
|
|
"full_name": "mind2hex\/CVE-2022-46169",
|
|
"owner": {
|
|
"login": "mind2hex",
|
|
"id": 51345640,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51345640?v=4",
|
|
"html_url": "https:\/\/github.com\/mind2hex",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/mind2hex\/CVE-2022-46169",
|
|
"description": null,
|
|
"fork": false,
|
|
"created_at": "2024-03-28T19:23:56Z",
|
|
"updated_at": "2024-03-28T19:44:04Z",
|
|
"pushed_at": "2024-03-28T19:24:54Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"has_discussions": false,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0,
|
|
"subscribers_count": 1
|
|
},
|
|
{
|
|
"id": 814041598,
|
|
"name": "CVE-2022-46169",
|
|
"full_name": "HPT-Intern-Task-Submission\/CVE-2022-46169",
|
|
"owner": {
|
|
"login": "HPT-Intern-Task-Submission",
|
|
"id": 169382051,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/169382051?v=4",
|
|
"html_url": "https:\/\/github.com\/HPT-Intern-Task-Submission",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/HPT-Intern-Task-Submission\/CVE-2022-46169",
|
|
"description": null,
|
|
"fork": false,
|
|
"created_at": "2024-06-12T08:24:30Z",
|
|
"updated_at": "2024-06-14T03:02:02Z",
|
|
"pushed_at": "2024-06-14T03:01:59Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"has_discussions": false,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0,
|
|
"subscribers_count": 0
|
|
},
|
|
{
|
|
"id": 912195951,
|
|
"name": "CVE-2022-46169",
|
|
"full_name": "lof1sec\/CVE-2022-46169",
|
|
"owner": {
|
|
"login": "lof1sec",
|
|
"id": 105061690,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/105061690?v=4",
|
|
"html_url": "https:\/\/github.com\/lof1sec",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/lof1sec\/CVE-2022-46169",
|
|
"description": "Cacti v1.2.22: Unauthenticated Command Injection Vulnerability (CVE-2022-46169)",
|
|
"fork": false,
|
|
"created_at": "2025-01-04T21:53:47Z",
|
|
"updated_at": "2025-01-06T11:49:57Z",
|
|
"pushed_at": "2025-01-06T11:49:54Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"has_discussions": false,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0,
|
|
"subscribers_count": 1
|
|
}
|
|
] |