This is modified code of 46635 exploit from python2 to python3.
详情: https://github.com/SUNNYSAINI01001/46635.py_CVE-2019-9053
None
update to Daniele Scanu's SQL Injection Exploit - CVE-2019-9053
详情: https://github.com/maraspiras/46635.py
None
None
详情: https://github.com/ELIZEUOPAIN/CVE-2019-9053-CMS-Made-Simple-2.2.10---SQL-Injection-Exploit
None
CVE-2019-9053 exploit ported to python3
详情: https://github.com/pedrojosenavasperez/CVE-2019-9053-Python3
None
The exploit is edited to work with different text encodings and Python 3 and is compatible with CMSMS version 2.2.9 and below.
详情: https://github.com/Mahamedm/CVE-2019-9053-Exploit-Python-3
None
This is the Updated Python3 exploit for CVE-2019-9053
详情: https://github.com/im-suman-roy/CVE-2019-9053
None
Original Exploit Source: https://www.exploit-db.com/exploits/46635
详情: https://github.com/kahluri/CVE-2019-9053
None
Python3 version of the Python2 exploit for CVE-2019-9053
详情: https://github.com/Doc0x1/CVE-2019-9053-Python3
None
This repository has the sole purpose of rewriting the CVE-2019-9053 script, which in the original publication is written in Python 2.7. I will be using Python 3.
详情: https://github.com/fernandobortotti/CVE-2019-9053
None
Improved code of Daniele Scanu SQL Injection exploit
详情: https://github.com/byrek/CVE-2019-9053
None
CVE-2019-9054 exploit added support for python3 + bug fixes
详情: https://github.com/FedericoTorres233/CVE-2019-9053-Fixed
None
This script is a modified version of the original exploit by Daniele Scanu which exploits an unauthenticated SQL injection vulnerability in CMS Made Simple <= 2.2.10 (CVE-2019-9053).
详情: https://github.com/Dh4nuJ4/SimpleCTF-UpdatedExploit
None
The script has been remastered by Teymur Novruzov to ensure compatibility with Python 3. This tool is intended for educational purposes only. Unauthorized use of this tool on any system or network without permission is illegal. The author is not responsible for any misuse of this tool.
详情: https://github.com/TeymurNovruzov/CVE-2019-9053-python3-remastered
None