{"vulnerability": "cve-2022-46604", "sightings": [{"uuid": "cd65fa24-7857-4234-9aae-93bebb7f0297", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-46604", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/8091", "content": "#exploit\n1. Exploit for elevation of privilege vulnerability in QuickHeal's Seqrite EPS\nhttps://github.com/0xinfection/epscalate\n\n2. Cloud Exploit Framework\nhttps://github.com/Rnalter/ThunderCloud\n\n3. CVE-2022-46604:\nResponsive FileManager 9.9.5 Remote Shell Upload\nhttps://packetstormsecurity.com/files/171720/Responsive-FileManager-9.9.5-Remote-Shell-Upload.html", "creation_timestamp": "2023-04-10T10:59:01.000000Z"}, {"uuid": "287f7dac-5c98-4be1-bbdb-05b6793ccaca", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-46604", "type": "exploited", "source": "https://www.exploit-db.com/exploits/51251", "content": "", "creation_timestamp": "2023-04-05T00:00:00.000000Z"}, {"uuid": "2308475e-fc86-414f-8511-d88914b42c14", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-46604", "type": "published-proof-of-concept", "source": "https://t.me/Exploitationn/2385", "content": "https://github.com/galoget/ResponsiveFileManager-CVE-2022-46604\n\nAuto Exploit Responsive File Manager in Python 3 \nRCE w Extension Bypass\n\nExample Site That using Responsive File Manager : http://www.better.in/resources/js/tinymce/plugins/filemanager/\nExample Dork : inurl:/filemanager/ intext:\u201dexecute.php\u201d\n\n@Exploitationn", "creation_timestamp": "2023-04-29T18:20:00.000000Z"}, {"uuid": "78e94b73-f2c2-493f-bda0-535d7fc37c78", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-46604", "type": "published-proof-of-concept", "source": "https://t.me/Exploitationn/517", "content": "https://github.com/galoget/ResponsiveFileManager-CVE-2022-46604\n\nAuto Exploit Responsive File Manager in Python 3 \nRCE w Extension Bypass\n\nExample Site That using Responsive File Manager : http://www.better.in/resources/js/tinymce/plugins/filemanager/\nExample Dork : inurl:/filemanager/ intext:\u201dexecute.php\u201d\n\n@Exploitationn", "creation_timestamp": "2023-04-29T18:20:00.000000Z"}, {"uuid": "9aa9bcc3-3641-4c5e-b605-30eb3dc6988e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-46604", "type": "published-proof-of-concept", "source": "https://t.me/DailyToolz/763", "content": "https://github.com/galoget/ResponsiveFileManager-CVE-2022-46604\n\nAuto Exploit Responsive File Manager in Python 3 \nRCE w Extension Bypass\n\nExample Site That using Responsive File Manager : http://www.better.in/resources/js/tinymce/plugins/filemanager/\nExample Dork : inurl:/filemanager/ intext:\u201dexecute.php\u201d\n\nfor better and fresh results you can use bruteDir \n\nFor more Always join @DailyToolz", "creation_timestamp": "2023-04-29T18:20:49.000000Z"}, {"uuid": "c22a174f-d9da-4c4d-91e6-3353455f1bd5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-46604", "type": "seen", "source": "https://t.me/cibsecurity/57393", "content": "\u203c CVE-2022-46604 \u203c\n\nAn issue in Tecrail Responsive FileManager v9.9.5 and below allows attackers to bypass the file extension check mechanism and upload a crafted PHP file, leading to arbitrary code execution.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-02-02T16:14:49.000000Z"}]}