mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-18 22:02:21 +01:00
238 lines
No EOL
7.6 KiB
JSON
238 lines
No EOL
7.6 KiB
JSON
[
|
|
{
|
|
"id": 515257144,
|
|
"name": "cve-2022-33891",
|
|
"full_name": "W01fh4cker\/cve-2022-33891",
|
|
"owner": {
|
|
"login": "W01fh4cker",
|
|
"id": 101872898,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/101872898?v=4",
|
|
"html_url": "https:\/\/github.com\/W01fh4cker"
|
|
},
|
|
"html_url": "https:\/\/github.com\/W01fh4cker\/cve-2022-33891",
|
|
"description": "cve-2022-33891-poc",
|
|
"fork": false,
|
|
"created_at": "2022-07-18T16:16:51Z",
|
|
"updated_at": "2022-07-25T15:10:47Z",
|
|
"pushed_at": "2022-07-20T08:00:18Z",
|
|
"stargazers_count": 43,
|
|
"watchers_count": 43,
|
|
"forks_count": 17,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [
|
|
"cve-2022-33891"
|
|
],
|
|
"visibility": "public",
|
|
"forks": 17,
|
|
"watchers": 43,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 515706046,
|
|
"name": "cve-2022-33891",
|
|
"full_name": "HuskyHacks\/cve-2022-33891",
|
|
"owner": {
|
|
"login": "HuskyHacks",
|
|
"id": 57866415,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57866415?v=4",
|
|
"html_url": "https:\/\/github.com\/HuskyHacks"
|
|
},
|
|
"html_url": "https:\/\/github.com\/HuskyHacks\/cve-2022-33891",
|
|
"description": "Apache Spark Shell Command Injection Vulnerability",
|
|
"fork": false,
|
|
"created_at": "2022-07-19T18:52:12Z",
|
|
"updated_at": "2022-08-10T11:50:40Z",
|
|
"pushed_at": "2022-07-22T21:47:53Z",
|
|
"stargazers_count": 64,
|
|
"watchers_count": 64,
|
|
"forks_count": 11,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 11,
|
|
"watchers": 64,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 515768225,
|
|
"name": "CVE-2022-33891",
|
|
"full_name": "west-wind\/CVE-2022-33891",
|
|
"owner": {
|
|
"login": "west-wind",
|
|
"id": 32312003,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/32312003?v=4",
|
|
"html_url": "https:\/\/github.com\/west-wind"
|
|
},
|
|
"html_url": "https:\/\/github.com\/west-wind\/CVE-2022-33891",
|
|
"description": "Apache Spark Command Injection PoC Exploit for CVE-2022-33891",
|
|
"fork": false,
|
|
"created_at": "2022-07-19T23:16:27Z",
|
|
"updated_at": "2022-08-13T15:50:10Z",
|
|
"pushed_at": "2022-07-21T08:32:08Z",
|
|
"stargazers_count": 22,
|
|
"watchers_count": 22,
|
|
"forks_count": 6,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [
|
|
"apache-spark",
|
|
"cve-2022-33891",
|
|
"cve-2022-33891-poc",
|
|
"poc",
|
|
"spark-acls-enable",
|
|
"vulnerability",
|
|
"vulnerability-identification"
|
|
],
|
|
"visibility": "public",
|
|
"forks": 6,
|
|
"watchers": 22,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 516156505,
|
|
"name": "cve-2022-33891",
|
|
"full_name": "AkbarTrilaksana\/cve-2022-33891",
|
|
"owner": {
|
|
"login": "AkbarTrilaksana",
|
|
"id": 108668044,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/108668044?v=4",
|
|
"html_url": "https:\/\/github.com\/AkbarTrilaksana"
|
|
},
|
|
"html_url": "https:\/\/github.com\/AkbarTrilaksana\/cve-2022-33891",
|
|
"description": null,
|
|
"fork": false,
|
|
"created_at": "2022-07-20T22:52:43Z",
|
|
"updated_at": "2022-07-25T09:44:37Z",
|
|
"pushed_at": "2022-07-20T22:53:36Z",
|
|
"stargazers_count": 2,
|
|
"watchers_count": 2,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 2,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 517259493,
|
|
"name": "cve-2022-33891",
|
|
"full_name": "llraudseppll\/cve-2022-33891",
|
|
"owner": {
|
|
"login": "llraudseppll",
|
|
"id": 50292087,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/50292087?v=4",
|
|
"html_url": "https:\/\/github.com\/llraudseppll"
|
|
},
|
|
"html_url": "https:\/\/github.com\/llraudseppll\/cve-2022-33891",
|
|
"description": "Apache Spark RCE",
|
|
"fork": false,
|
|
"created_at": "2022-07-24T07:45:46Z",
|
|
"updated_at": "2022-07-24T15:41:30Z",
|
|
"pushed_at": "2022-07-24T07:48:41Z",
|
|
"stargazers_count": 1,
|
|
"watchers_count": 1,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [
|
|
"cve-2022-33891"
|
|
],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 1,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 519637095,
|
|
"name": "CVE-2022-33891",
|
|
"full_name": "AmoloHT\/CVE-2022-33891",
|
|
"owner": {
|
|
"login": "AmoloHT",
|
|
"id": 106687805,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/106687805?v=4",
|
|
"html_url": "https:\/\/github.com\/AmoloHT"
|
|
},
|
|
"html_url": "https:\/\/github.com\/AmoloHT\/CVE-2022-33891",
|
|
"description": "「💥」CVE-2022-33891 - Apache Spark Command Injection",
|
|
"fork": false,
|
|
"created_at": "2022-07-30T23:02:16Z",
|
|
"updated_at": "2022-08-08T21:55:28Z",
|
|
"pushed_at": "2022-08-01T21:30:09Z",
|
|
"stargazers_count": 16,
|
|
"watchers_count": 16,
|
|
"forks_count": 2,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [
|
|
"apache",
|
|
"code",
|
|
"code-injection",
|
|
"command",
|
|
"concept",
|
|
"cve",
|
|
"cve-2022-33891",
|
|
"exploit",
|
|
"hacking",
|
|
"injection",
|
|
"poc",
|
|
"proof",
|
|
"proof-of-concept",
|
|
"python",
|
|
"rce",
|
|
"script",
|
|
"shell",
|
|
"spark"
|
|
],
|
|
"visibility": "public",
|
|
"forks": 2,
|
|
"watchers": 16,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 520612196,
|
|
"name": "CVE-2022-33891",
|
|
"full_name": "XmasSnowISBACK\/CVE-2022-33891",
|
|
"owner": {
|
|
"login": "XmasSnowISBACK",
|
|
"id": 105931778,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/105931778?v=4",
|
|
"html_url": "https:\/\/github.com\/XmasSnowISBACK"
|
|
},
|
|
"html_url": "https:\/\/github.com\/XmasSnowISBACK\/CVE-2022-33891",
|
|
"description": "CVE-2022-33891 - Apache Spark Command Injection ",
|
|
"fork": false,
|
|
"created_at": "2022-08-02T18:41:39Z",
|
|
"updated_at": "2022-08-05T10:14:03Z",
|
|
"pushed_at": "2022-08-02T18:50:14Z",
|
|
"stargazers_count": 1,
|
|
"watchers_count": 1,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [
|
|
"apache-spark",
|
|
"cve-2022-33891",
|
|
"exploit",
|
|
"injection",
|
|
"proof-of-concept",
|
|
"python",
|
|
"rce",
|
|
"shell"
|
|
],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 1,
|
|
"score": 0
|
|
}
|
|
] |