[ { "id": 515257144, "name": "cve-2022-33891", "full_name": "W01fh4cker\/cve-2022-33891", "owner": { "login": "W01fh4cker", "id": 101872898, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/101872898?v=4", "html_url": "https:\/\/github.com\/W01fh4cker", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/W01fh4cker\/cve-2022-33891", "description": "cve-2022-33891-poc", "fork": false, "created_at": "2022-07-18T16:16:51Z", "updated_at": "2024-08-12T20:25:12Z", "pushed_at": "2022-07-20T08:00:18Z", "stargazers_count": 52, "watchers_count": 52, "has_discussions": false, "forks_count": 22, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "cve-2022-33891" ], "visibility": "public", "forks": 22, "watchers": 52, "score": 0, "subscribers_count": 4 }, { "id": 515706046, "name": "cve-2022-33891", "full_name": "HuskyHacks\/cve-2022-33891", "owner": { "login": "HuskyHacks", "id": 57866415, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57866415?v=4", "html_url": "https:\/\/github.com\/HuskyHacks", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/HuskyHacks\/cve-2022-33891", "description": "Apache Spark Shell Command Injection Vulnerability", "fork": false, "created_at": "2022-07-19T18:52:12Z", "updated_at": "2024-08-26T13:05:06Z", "pushed_at": "2022-09-07T18:12:27Z", "stargazers_count": 87, "watchers_count": 87, "has_discussions": false, "forks_count": 20, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 20, "watchers": 87, "score": 0, "subscribers_count": 4 }, { "id": 515842699, "name": "CVE-2022-33891", "full_name": "nanaao\/CVE-2022-33891", "owner": { "login": "nanaao", "id": 77666853, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/77666853?v=4", "html_url": "https:\/\/github.com\/nanaao", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/nanaao\/CVE-2022-33891", "description": "PoC for CVE-2022-33891", "fork": false, "created_at": "2022-07-20T05:15:28Z", "updated_at": "2022-07-20T05:15:24Z", "pushed_at": "2022-07-19T23:20:14Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 7, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 7, "watchers": 0, "score": 0, "subscribers_count": 0 }, { "id": 516156505, "name": "cve-2022-33891", "full_name": "AkbarTrilaksana\/cve-2022-33891", "owner": { "login": "AkbarTrilaksana", "id": 108668044, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/108668044?v=4", "html_url": "https:\/\/github.com\/AkbarTrilaksana", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/AkbarTrilaksana\/cve-2022-33891", "description": null, "fork": false, "created_at": "2022-07-20T22:52:43Z", "updated_at": "2022-09-19T13:06:15Z", "pushed_at": "2024-06-18T14:07:23Z", "stargazers_count": 3, "watchers_count": 3, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 3, "score": 0, "subscribers_count": 1 }, { "id": 517259493, "name": "cve-2022-33891", "full_name": "llraudseppll\/cve-2022-33891", "owner": { "login": "llraudseppll", "id": 50292087, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/50292087?v=4", "html_url": "https:\/\/github.com\/llraudseppll", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/llraudseppll\/cve-2022-33891", "description": "Apache Spark RCE", "fork": false, "created_at": "2022-07-24T07:45:46Z", "updated_at": "2024-08-12T20:25:24Z", "pushed_at": "2022-07-24T07:48:41Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "cve-2022-33891" ], "visibility": "public", "forks": 1, "watchers": 1, "score": 0, "subscribers_count": 2 }, { "id": 519637095, "name": "CVE-2022-33891", "full_name": "AmoloHT\/CVE-2022-33891", "owner": { "login": "AmoloHT", "id": 106687805, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/106687805?v=4", "html_url": "https:\/\/github.com\/AmoloHT", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/AmoloHT\/CVE-2022-33891", "description": "「💥」CVE-2022-33891 - Apache Spark Command Injection", "fork": false, "created_at": "2022-07-30T23:02:16Z", "updated_at": "2024-08-12T20:25:43Z", "pushed_at": "2022-08-01T21:30:09Z", "stargazers_count": 27, "watchers_count": 27, "has_discussions": false, "forks_count": 6, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "apache", "code", "code-injection", "command", "concept", "cve", "cve-2022-33891", "exploit", "hacking", "injection", "poc", "proof", "proof-of-concept", "python", "rce", "script", "shell", "spark" ], "visibility": "public", "forks": 6, "watchers": 27, "score": 0, "subscribers_count": 2 }, { "id": 524526248, "name": "CVE-2022-33891", "full_name": "DrLinuxOfficial\/CVE-2022-33891", "owner": { "login": "DrLinuxOfficial", "id": 88365653, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88365653?v=4", "html_url": "https:\/\/github.com\/DrLinuxOfficial", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/DrLinuxOfficial\/CVE-2022-33891", "description": "CVE-2022-33891 Exploit For Apache Spark", "fork": false, "created_at": "2022-08-13T23:02:56Z", "updated_at": "2022-08-15T02:26:44Z", "pushed_at": "2022-08-13T23:07:12Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 1, "score": 0, "subscribers_count": 2 }, { "id": 530137358, "name": "Apache-spark-CVE-2022-33891", "full_name": "Vulnmachines\/Apache-spark-CVE-2022-33891", "owner": { "login": "Vulnmachines", "id": 79006904, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/79006904?v=4", "html_url": "https:\/\/github.com\/Vulnmachines", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/Vulnmachines\/Apache-spark-CVE-2022-33891", "description": "Apache Spark RCE - CVE-2022-33891", "fork": false, "created_at": "2022-08-29T08:48:38Z", "updated_at": "2022-08-31T08:16:54Z", "pushed_at": "2022-08-30T12:03:50Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 1, "score": 0, "subscribers_count": 1 }, { "id": 575180100, "name": "lab_security_apache_spark_emulation_detection", "full_name": "ps-interactive\/lab_security_apache_spark_emulation_detection", "owner": { "login": "ps-interactive", "id": 35313392, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/35313392?v=4", "html_url": "https:\/\/github.com\/ps-interactive", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/ps-interactive\/lab_security_apache_spark_emulation_detection", "description": "For CVE-2022-33891 Apache Spark: Emulation and Detection by West Shepherd", "fork": false, "created_at": "2022-12-06T23:44:30Z", "updated_at": "2024-08-19T21:35:03Z", "pushed_at": "2024-08-19T21:35:00Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 6 }, { "id": 723685053, "name": "cve-2022-33891-fix", "full_name": "elsvital\/cve-2022-33891-fix", "owner": { "login": "elsvital", "id": 4923784, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4923784?v=4", "html_url": "https:\/\/github.com\/elsvital", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/elsvital\/cve-2022-33891-fix", "description": null, "fork": false, "created_at": "2023-11-26T13:09:28Z", "updated_at": "2023-11-26T13:47:47Z", "pushed_at": "2023-11-26T13:52:57Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 761826205, "name": "CVE-2022-33891-EXPLOIT", "full_name": "K3ysTr0K3R\/CVE-2022-33891-EXPLOIT", "owner": { "login": "K3ysTr0K3R", "id": 70909693, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/70909693?v=4", "html_url": "https:\/\/github.com\/K3ysTr0K3R", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/K3ysTr0K3R\/CVE-2022-33891-EXPLOIT", "description": "A PoC exploit for CVE-2022-33891 - Apache Spark UI Remote Code Execution (RCE)", "fork": false, "created_at": "2024-02-22T15:05:00Z", "updated_at": "2024-08-03T02:02:52Z", "pushed_at": "2024-02-22T16:19:49Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "command-injection", "cve-2022-33891", "cve-2022-33891-poc", "exploit", "hacking", "poc", "remote-code-execution" ], "visibility": "public", "forks": 0, "watchers": 1, "score": 0, "subscribers_count": 2 } ]