mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-12-26 14:15:32 +01:00
130 lines
No EOL
5 KiB
JSON
130 lines
No EOL
5 KiB
JSON
[
|
|
{
|
|
"id": 459508869,
|
|
"name": "CVE-2022-22536",
|
|
"full_name": "ZZ-SOCMAP\/CVE-2022-22536",
|
|
"owner": {
|
|
"login": "ZZ-SOCMAP",
|
|
"id": 98105412,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/98105412?v=4",
|
|
"html_url": "https:\/\/github.com\/ZZ-SOCMAP",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/ZZ-SOCMAP\/CVE-2022-22536",
|
|
"description": "SAP memory pipes(MPI) desynchronization vulnerability CVE-2022-22536.",
|
|
"fork": false,
|
|
"created_at": "2022-02-15T09:22:19Z",
|
|
"updated_at": "2025-03-05T14:48:25Z",
|
|
"pushed_at": "2022-02-21T08:58:22Z",
|
|
"stargazers_count": 51,
|
|
"watchers_count": 51,
|
|
"has_discussions": false,
|
|
"forks_count": 15,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 15,
|
|
"watchers": 51,
|
|
"score": 0,
|
|
"subscribers_count": 3
|
|
},
|
|
{
|
|
"id": 477106089,
|
|
"name": "SAP-memory-pipes-desynchronization-vulnerability-MPI-CVE-2022-22536",
|
|
"full_name": "tess-ss\/SAP-memory-pipes-desynchronization-vulnerability-MPI-CVE-2022-22536",
|
|
"owner": {
|
|
"login": "tess-ss",
|
|
"id": 65326024,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/65326024?v=4",
|
|
"html_url": "https:\/\/github.com\/tess-ss",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/tess-ss\/SAP-memory-pipes-desynchronization-vulnerability-MPI-CVE-2022-22536",
|
|
"description": null,
|
|
"fork": false,
|
|
"created_at": "2022-04-02T16:12:56Z",
|
|
"updated_at": "2025-10-04T14:00:40Z",
|
|
"pushed_at": "2022-04-02T16:57:00Z",
|
|
"stargazers_count": 10,
|
|
"watchers_count": 10,
|
|
"has_discussions": false,
|
|
"forks_count": 5,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 5,
|
|
"watchers": 10,
|
|
"score": 0,
|
|
"subscribers_count": 1
|
|
},
|
|
{
|
|
"id": 958863134,
|
|
"name": "SAPGateBreaker-Exploit",
|
|
"full_name": "BecodoExploit-mrCAT\/SAPGateBreaker-Exploit",
|
|
"owner": {
|
|
"login": "BecodoExploit-mrCAT",
|
|
"id": 31081984,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31081984?v=4",
|
|
"html_url": "https:\/\/github.com\/BecodoExploit-mrCAT",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/BecodoExploit-mrCAT\/SAPGateBreaker-Exploit",
|
|
"description": "SAPGateBreaker is a PoC exploit for CVE-2022-22536, a critical HTTP Request Smuggling vulnerability in SAP NetWeaver. It demonstrates how to bypass ACLs by desynchronizing request parsing between ICM and backend services using crafted Content-Length-based payloads.",
|
|
"fork": false,
|
|
"created_at": "2025-04-01T22:16:04Z",
|
|
"updated_at": "2025-04-08T05:36:28Z",
|
|
"pushed_at": "2025-04-02T00:18:06Z",
|
|
"stargazers_count": 1,
|
|
"watchers_count": 1,
|
|
"has_discussions": false,
|
|
"forks_count": 2,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [
|
|
"exploit",
|
|
"exploit-development",
|
|
"sap"
|
|
],
|
|
"visibility": "public",
|
|
"forks": 2,
|
|
"watchers": 1,
|
|
"score": 0,
|
|
"subscribers_count": 1
|
|
},
|
|
{
|
|
"id": 1087349977,
|
|
"name": "CVE-2022-22536_SAP_Request_Smuggling_Scanner",
|
|
"full_name": "abrewer251\/CVE-2022-22536_SAP_Request_Smuggling_Scanner",
|
|
"owner": {
|
|
"login": "abrewer251",
|
|
"id": 150287770,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/150287770?v=4",
|
|
"html_url": "https:\/\/github.com\/abrewer251",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/abrewer251\/CVE-2022-22536_SAP_Request_Smuggling_Scanner",
|
|
"description": "Fast, socket-level scanner for detecting CVE-2022-22536 in SAP ICM or Web Dispatcher instances. Performs request smuggling tests with a crafted MPI-desync payload. Supports batch scanning IP:PORT targets via plain text files.",
|
|
"fork": false,
|
|
"created_at": "2025-10-31T19:02:02Z",
|
|
"updated_at": "2025-10-31T19:06:09Z",
|
|
"pushed_at": "2025-10-31T19:06:06Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"has_discussions": false,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0,
|
|
"subscribers_count": 0
|
|
}
|
|
] |