mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
374 lines
No EOL
12 KiB
JSON
374 lines
No EOL
12 KiB
JSON
[
|
|
{
|
|
"id": 515257144,
|
|
"name": "cve-2022-33891",
|
|
"full_name": "W01fh4cker\/cve-2022-33891",
|
|
"owner": {
|
|
"login": "W01fh4cker",
|
|
"id": 101872898,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/101872898?v=4",
|
|
"html_url": "https:\/\/github.com\/W01fh4cker",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/W01fh4cker\/cve-2022-33891",
|
|
"description": "cve-2022-33891-poc",
|
|
"fork": false,
|
|
"created_at": "2022-07-18T16:16:51Z",
|
|
"updated_at": "2024-08-12T20:25:12Z",
|
|
"pushed_at": "2022-07-20T08:00:18Z",
|
|
"stargazers_count": 52,
|
|
"watchers_count": 52,
|
|
"has_discussions": false,
|
|
"forks_count": 22,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [
|
|
"cve-2022-33891"
|
|
],
|
|
"visibility": "public",
|
|
"forks": 22,
|
|
"watchers": 52,
|
|
"score": 0,
|
|
"subscribers_count": 4
|
|
},
|
|
{
|
|
"id": 515706046,
|
|
"name": "cve-2022-33891",
|
|
"full_name": "HuskyHacks\/cve-2022-33891",
|
|
"owner": {
|
|
"login": "HuskyHacks",
|
|
"id": 57866415,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57866415?v=4",
|
|
"html_url": "https:\/\/github.com\/HuskyHacks",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/HuskyHacks\/cve-2022-33891",
|
|
"description": "Apache Spark Shell Command Injection Vulnerability",
|
|
"fork": false,
|
|
"created_at": "2022-07-19T18:52:12Z",
|
|
"updated_at": "2024-08-26T13:05:06Z",
|
|
"pushed_at": "2022-09-07T18:12:27Z",
|
|
"stargazers_count": 87,
|
|
"watchers_count": 87,
|
|
"has_discussions": false,
|
|
"forks_count": 20,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 20,
|
|
"watchers": 87,
|
|
"score": 0,
|
|
"subscribers_count": 4
|
|
},
|
|
{
|
|
"id": 515842699,
|
|
"name": "CVE-2022-33891",
|
|
"full_name": "nanaao\/CVE-2022-33891",
|
|
"owner": {
|
|
"login": "nanaao",
|
|
"id": 77666853,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/77666853?v=4",
|
|
"html_url": "https:\/\/github.com\/nanaao",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/nanaao\/CVE-2022-33891",
|
|
"description": "PoC for CVE-2022-33891",
|
|
"fork": false,
|
|
"created_at": "2022-07-20T05:15:28Z",
|
|
"updated_at": "2022-07-20T05:15:24Z",
|
|
"pushed_at": "2022-07-19T23:20:14Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"has_discussions": false,
|
|
"forks_count": 7,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 7,
|
|
"watchers": 0,
|
|
"score": 0,
|
|
"subscribers_count": 0
|
|
},
|
|
{
|
|
"id": 516156505,
|
|
"name": "cve-2022-33891",
|
|
"full_name": "AkbarTrilaksana\/cve-2022-33891",
|
|
"owner": {
|
|
"login": "AkbarTrilaksana",
|
|
"id": 108668044,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/108668044?v=4",
|
|
"html_url": "https:\/\/github.com\/AkbarTrilaksana",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/AkbarTrilaksana\/cve-2022-33891",
|
|
"description": null,
|
|
"fork": false,
|
|
"created_at": "2022-07-20T22:52:43Z",
|
|
"updated_at": "2022-09-19T13:06:15Z",
|
|
"pushed_at": "2024-06-18T14:07:23Z",
|
|
"stargazers_count": 3,
|
|
"watchers_count": 3,
|
|
"has_discussions": false,
|
|
"forks_count": 1,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 1,
|
|
"watchers": 3,
|
|
"score": 0,
|
|
"subscribers_count": 1
|
|
},
|
|
{
|
|
"id": 517259493,
|
|
"name": "cve-2022-33891",
|
|
"full_name": "llraudseppll\/cve-2022-33891",
|
|
"owner": {
|
|
"login": "llraudseppll",
|
|
"id": 50292087,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/50292087?v=4",
|
|
"html_url": "https:\/\/github.com\/llraudseppll",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/llraudseppll\/cve-2022-33891",
|
|
"description": "Apache Spark RCE",
|
|
"fork": false,
|
|
"created_at": "2022-07-24T07:45:46Z",
|
|
"updated_at": "2024-08-12T20:25:24Z",
|
|
"pushed_at": "2022-07-24T07:48:41Z",
|
|
"stargazers_count": 1,
|
|
"watchers_count": 1,
|
|
"has_discussions": false,
|
|
"forks_count": 1,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [
|
|
"cve-2022-33891"
|
|
],
|
|
"visibility": "public",
|
|
"forks": 1,
|
|
"watchers": 1,
|
|
"score": 0,
|
|
"subscribers_count": 2
|
|
},
|
|
{
|
|
"id": 519637095,
|
|
"name": "CVE-2022-33891",
|
|
"full_name": "AmoloHT\/CVE-2022-33891",
|
|
"owner": {
|
|
"login": "AmoloHT",
|
|
"id": 106687805,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/106687805?v=4",
|
|
"html_url": "https:\/\/github.com\/AmoloHT",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/AmoloHT\/CVE-2022-33891",
|
|
"description": "「💥」CVE-2022-33891 - Apache Spark Command Injection",
|
|
"fork": false,
|
|
"created_at": "2022-07-30T23:02:16Z",
|
|
"updated_at": "2024-08-12T20:25:43Z",
|
|
"pushed_at": "2022-08-01T21:30:09Z",
|
|
"stargazers_count": 27,
|
|
"watchers_count": 27,
|
|
"has_discussions": false,
|
|
"forks_count": 6,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [
|
|
"apache",
|
|
"code",
|
|
"code-injection",
|
|
"command",
|
|
"concept",
|
|
"cve",
|
|
"cve-2022-33891",
|
|
"exploit",
|
|
"hacking",
|
|
"injection",
|
|
"poc",
|
|
"proof",
|
|
"proof-of-concept",
|
|
"python",
|
|
"rce",
|
|
"script",
|
|
"shell",
|
|
"spark"
|
|
],
|
|
"visibility": "public",
|
|
"forks": 6,
|
|
"watchers": 27,
|
|
"score": 0,
|
|
"subscribers_count": 2
|
|
},
|
|
{
|
|
"id": 524526248,
|
|
"name": "CVE-2022-33891",
|
|
"full_name": "DrLinuxOfficial\/CVE-2022-33891",
|
|
"owner": {
|
|
"login": "DrLinuxOfficial",
|
|
"id": 88365653,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88365653?v=4",
|
|
"html_url": "https:\/\/github.com\/DrLinuxOfficial",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/DrLinuxOfficial\/CVE-2022-33891",
|
|
"description": "CVE-2022-33891 Exploit For Apache Spark",
|
|
"fork": false,
|
|
"created_at": "2022-08-13T23:02:56Z",
|
|
"updated_at": "2022-08-15T02:26:44Z",
|
|
"pushed_at": "2022-08-13T23:07:12Z",
|
|
"stargazers_count": 1,
|
|
"watchers_count": 1,
|
|
"has_discussions": false,
|
|
"forks_count": 1,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 1,
|
|
"watchers": 1,
|
|
"score": 0,
|
|
"subscribers_count": 2
|
|
},
|
|
{
|
|
"id": 530137358,
|
|
"name": "Apache-spark-CVE-2022-33891",
|
|
"full_name": "Vulnmachines\/Apache-spark-CVE-2022-33891",
|
|
"owner": {
|
|
"login": "Vulnmachines",
|
|
"id": 79006904,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/79006904?v=4",
|
|
"html_url": "https:\/\/github.com\/Vulnmachines",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/Vulnmachines\/Apache-spark-CVE-2022-33891",
|
|
"description": "Apache Spark RCE - CVE-2022-33891",
|
|
"fork": false,
|
|
"created_at": "2022-08-29T08:48:38Z",
|
|
"updated_at": "2022-08-31T08:16:54Z",
|
|
"pushed_at": "2022-08-30T12:03:50Z",
|
|
"stargazers_count": 1,
|
|
"watchers_count": 1,
|
|
"has_discussions": false,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 1,
|
|
"score": 0,
|
|
"subscribers_count": 1
|
|
},
|
|
{
|
|
"id": 575180100,
|
|
"name": "lab_security_apache_spark_emulation_detection",
|
|
"full_name": "ps-interactive\/lab_security_apache_spark_emulation_detection",
|
|
"owner": {
|
|
"login": "ps-interactive",
|
|
"id": 35313392,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/35313392?v=4",
|
|
"html_url": "https:\/\/github.com\/ps-interactive",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/ps-interactive\/lab_security_apache_spark_emulation_detection",
|
|
"description": "For CVE-2022-33891 Apache Spark: Emulation and Detection by West Shepherd",
|
|
"fork": false,
|
|
"created_at": "2022-12-06T23:44:30Z",
|
|
"updated_at": "2024-08-19T21:35:03Z",
|
|
"pushed_at": "2024-08-19T21:35:00Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"has_discussions": false,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0,
|
|
"subscribers_count": 6
|
|
},
|
|
{
|
|
"id": 723685053,
|
|
"name": "cve-2022-33891-fix",
|
|
"full_name": "elsvital\/cve-2022-33891-fix",
|
|
"owner": {
|
|
"login": "elsvital",
|
|
"id": 4923784,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4923784?v=4",
|
|
"html_url": "https:\/\/github.com\/elsvital",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/elsvital\/cve-2022-33891-fix",
|
|
"description": null,
|
|
"fork": false,
|
|
"created_at": "2023-11-26T13:09:28Z",
|
|
"updated_at": "2023-11-26T13:47:47Z",
|
|
"pushed_at": "2023-11-26T13:52:57Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"has_discussions": false,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0,
|
|
"subscribers_count": 1
|
|
},
|
|
{
|
|
"id": 761826205,
|
|
"name": "CVE-2022-33891-EXPLOIT",
|
|
"full_name": "K3ysTr0K3R\/CVE-2022-33891-EXPLOIT",
|
|
"owner": {
|
|
"login": "K3ysTr0K3R",
|
|
"id": 70909693,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/70909693?v=4",
|
|
"html_url": "https:\/\/github.com\/K3ysTr0K3R",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/K3ysTr0K3R\/CVE-2022-33891-EXPLOIT",
|
|
"description": "A PoC exploit for CVE-2022-33891 - Apache Spark UI Remote Code Execution (RCE)",
|
|
"fork": false,
|
|
"created_at": "2024-02-22T15:05:00Z",
|
|
"updated_at": "2024-08-03T02:02:52Z",
|
|
"pushed_at": "2024-02-22T16:19:49Z",
|
|
"stargazers_count": 1,
|
|
"watchers_count": 1,
|
|
"has_discussions": false,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [
|
|
"command-injection",
|
|
"cve-2022-33891",
|
|
"cve-2022-33891-poc",
|
|
"exploit",
|
|
"hacking",
|
|
"poc",
|
|
"remote-code-execution"
|
|
],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 1,
|
|
"score": 0,
|
|
"subscribers_count": 2
|
|
}
|
|
] |