[ { "id": 515257144, "name": "cve-2022-33891", "full_name": "W01fh4cker\/cve-2022-33891", "owner": { "login": "W01fh4cker", "id": 101872898, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/101872898?v=4", "html_url": "https:\/\/github.com\/W01fh4cker" }, "html_url": "https:\/\/github.com\/W01fh4cker\/cve-2022-33891", "description": "cve-2022-33891-poc", "fork": false, "created_at": "2022-07-18T16:16:51Z", "updated_at": "2024-07-16T13:10:13Z", "pushed_at": "2022-07-20T08:00:18Z", "stargazers_count": 53, "watchers_count": 53, "has_discussions": false, "forks_count": 22, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "cve-2022-33891" ], "visibility": "public", "forks": 22, "watchers": 53, "score": 0, "subscribers_count": 4 }, { "id": 515706046, "name": "cve-2022-33891", "full_name": "HuskyHacks\/cve-2022-33891", "owner": { "login": "HuskyHacks", "id": 57866415, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57866415?v=4", "html_url": "https:\/\/github.com\/HuskyHacks" }, "html_url": "https:\/\/github.com\/HuskyHacks\/cve-2022-33891", "description": "Apache Spark Shell Command Injection Vulnerability", "fork": false, "created_at": "2022-07-19T18:52:12Z", "updated_at": "2024-05-10T10:46:31Z", "pushed_at": "2022-09-07T18:12:27Z", "stargazers_count": 87, "watchers_count": 87, "has_discussions": false, "forks_count": 20, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 20, "watchers": 87, "score": 0, "subscribers_count": 4 }, { "id": 515768225, "name": "CVE-2022-33891", "full_name": "west-wind\/CVE-2022-33891", "owner": { "login": "west-wind", "id": 32312003, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/32312003?v=4", "html_url": "https:\/\/github.com\/west-wind" }, "html_url": "https:\/\/github.com\/west-wind\/CVE-2022-33891", "description": "Apache Spark Command Injection PoC Exploit for CVE-2022-33891", "fork": false, "created_at": "2022-07-19T23:16:27Z", "updated_at": "2024-06-30T00:31:34Z", "pushed_at": "2022-07-21T08:32:08Z", "stargazers_count": 23, "watchers_count": 23, "has_discussions": false, "forks_count": 10, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "apache-spark", "cve-2022-33891", "cve-2022-33891-poc", "poc", "spark-acls-enable", "vulnerability", "vulnerability-identification" ], "visibility": "public", "forks": 10, "watchers": 23, "score": 0, "subscribers_count": 2 }, { "id": 516156505, "name": "cve-2022-33891", "full_name": "AkbarTrilaksana\/cve-2022-33891", "owner": { "login": "AkbarTrilaksana", "id": 108668044, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/108668044?v=4", "html_url": "https:\/\/github.com\/AkbarTrilaksana" }, "html_url": "https:\/\/github.com\/AkbarTrilaksana\/cve-2022-33891", "description": null, "fork": false, "created_at": "2022-07-20T22:52:43Z", "updated_at": "2022-09-19T13:06:15Z", "pushed_at": "2024-06-18T14:07:23Z", "stargazers_count": 3, "watchers_count": 3, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 3, "score": 0, "subscribers_count": 1 }, { "id": 517259493, "name": "cve-2022-33891", "full_name": "llraudseppll\/cve-2022-33891", "owner": { "login": "llraudseppll", "id": 50292087, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/50292087?v=4", "html_url": "https:\/\/github.com\/llraudseppll" }, "html_url": "https:\/\/github.com\/llraudseppll\/cve-2022-33891", "description": "Apache Spark RCE", "fork": false, "created_at": "2022-07-24T07:45:46Z", "updated_at": "2023-09-28T11:41:03Z", "pushed_at": "2022-07-24T07:48:41Z", "stargazers_count": 2, "watchers_count": 2, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "cve-2022-33891" ], "visibility": "public", "forks": 1, "watchers": 2, "score": 0, "subscribers_count": 2 }, { "id": 519637095, "name": "CVE-2022-33891", "full_name": "AmoloHT\/CVE-2022-33891", "owner": { "login": "AmoloHT", "id": 106687805, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/106687805?v=4", "html_url": "https:\/\/github.com\/AmoloHT" }, "html_url": "https:\/\/github.com\/AmoloHT\/CVE-2022-33891", "description": "「💥」CVE-2022-33891 - Apache Spark Command Injection", "fork": false, "created_at": "2022-07-30T23:02:16Z", "updated_at": "2024-07-03T23:36:17Z", "pushed_at": "2022-08-01T21:30:09Z", "stargazers_count": 28, "watchers_count": 28, "has_discussions": false, "forks_count": 6, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "apache", "code", "code-injection", "command", "concept", "cve", "cve-2022-33891", "exploit", "hacking", "injection", "poc", "proof", "proof-of-concept", "python", "rce", "script", "shell", "spark" ], "visibility": "public", "forks": 6, "watchers": 28, "score": 0, "subscribers_count": 2 }, { "id": 524526248, "name": "CVE-2022-33891", "full_name": "DrLinuxOfficial\/CVE-2022-33891", "owner": { "login": "DrLinuxOfficial", "id": 88365653, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88365653?v=4", "html_url": "https:\/\/github.com\/DrLinuxOfficial" }, "html_url": "https:\/\/github.com\/DrLinuxOfficial\/CVE-2022-33891", "description": "CVE-2022-33891 Exploit For Apache Spark", "fork": false, "created_at": "2022-08-13T23:02:56Z", "updated_at": "2022-08-15T02:26:44Z", "pushed_at": "2022-08-13T23:07:12Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 1, "score": 0, "subscribers_count": 2 }, { "id": 530137358, "name": "Apache-spark-CVE-2022-33891", "full_name": "Vulnmachines\/Apache-spark-CVE-2022-33891", "owner": { "login": "Vulnmachines", "id": 79006904, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/79006904?v=4", "html_url": "https:\/\/github.com\/Vulnmachines" }, "html_url": "https:\/\/github.com\/Vulnmachines\/Apache-spark-CVE-2022-33891", "description": "Apache Spark RCE - CVE-2022-33891", "fork": false, "created_at": "2022-08-29T08:48:38Z", "updated_at": "2022-08-31T08:16:54Z", "pushed_at": "2022-08-30T12:03:50Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 1, "score": 0, "subscribers_count": 1 }, { "id": 575180100, "name": "lab_security_apache_spark_emulation_detection", "full_name": "ps-interactive\/lab_security_apache_spark_emulation_detection", "owner": { "login": "ps-interactive", "id": 35313392, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/35313392?v=4", "html_url": "https:\/\/github.com\/ps-interactive" }, "html_url": "https:\/\/github.com\/ps-interactive\/lab_security_apache_spark_emulation_detection", "description": "For CVE-2022-33891 Apache Spark: Emulation and Detection by West Shepherd", "fork": false, "created_at": "2022-12-06T23:44:30Z", "updated_at": "2022-12-06T23:56:57Z", "pushed_at": "2022-12-08T12:59:28Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 6 }, { "id": 692045825, "name": "CVE-2022-33891", "full_name": "IMHarman\/CVE-2022-33891", "owner": { "login": "IMHarman", "id": 84379579, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/84379579?v=4", "html_url": "https:\/\/github.com\/IMHarman" }, "html_url": "https:\/\/github.com\/IMHarman\/CVE-2022-33891", "description": null, "fork": false, "created_at": "2023-09-15T12:49:58Z", "updated_at": "2023-09-15T12:49:58Z", "pushed_at": "2023-09-15T12:55:46Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 723685053, "name": "cve-2022-33891-fix", "full_name": "elsvital\/cve-2022-33891-fix", "owner": { "login": "elsvital", "id": 4923784, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4923784?v=4", "html_url": "https:\/\/github.com\/elsvital" }, "html_url": "https:\/\/github.com\/elsvital\/cve-2022-33891-fix", "description": null, "fork": false, "created_at": "2023-11-26T13:09:28Z", "updated_at": "2023-11-26T13:47:47Z", "pushed_at": "2023-11-26T13:52:57Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 761826205, "name": "CVE-2022-33891-EXPLOIT", "full_name": "K3ysTr0K3R\/CVE-2022-33891-EXPLOIT", "owner": { "login": "K3ysTr0K3R", "id": 70909693, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/70909693?v=4", "html_url": "https:\/\/github.com\/K3ysTr0K3R" }, "html_url": "https:\/\/github.com\/K3ysTr0K3R\/CVE-2022-33891-EXPLOIT", "description": "A PoC exploit for CVE-2022-33891 - Apache Spark UI Remote Code Execution (RCE)", "fork": false, "created_at": "2024-02-22T15:05:00Z", "updated_at": "2024-02-22T16:30:56Z", "pushed_at": "2024-02-22T16:19:49Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "command-injection", "cve-2022-33891", "cve-2022-33891-poc", "exploit", "hacking", "poc", "remote-code-execution" ], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 2 } ]