尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
| 厂商 | 产品 | 影响版本 | CPE | 订阅 |
|---|---|---|---|---|
| - | n/a | n/a | - |
| # | POC 描述 | 源链接 | 神龙链接 |
|---|---|---|---|
| 1 | This is modified code of 46635 exploit from python2 to python3. | https://github.com/SUNNYSAINI01001/46635.py_CVE-2019-9053 | POC详情 |
| 2 | None | https://github.com/crypticdante/CVE-2019-9053 | POC详情 |
| 3 | update to Daniele Scanu's SQL Injection Exploit - CVE-2019-9053 | https://github.com/maraspiras/46635.py | POC详情 |
| 4 | CVE-2019-9053 Exploit for Python 3 | https://github.com/e-renna/CVE-2019-9053 | POC详情 |
| 5 | This is a exploit for CVE-2019-9053 | https://github.com/zmiddle/Simple_CMS_SQLi | POC详情 |
| 6 | None | https://github.com/ELIZEUOPAIN/CVE-2019-9053-CMS-Made-Simple-2.2.10---SQL-Injection-Exploit | POC详情 |
| 7 | CVE-2019-9053 exploit ported to python3 | https://github.com/pedrojosenavasperez/CVE-2019-9053-Python3 | POC详情 |
| 8 | CMS Made Simple < 2.2.10 - SQL Injection | https://github.com/STERN3L/CVE-2019-9053 | POC详情 |
| 9 | The exploit is edited to work with different text encodings and Python 3 and is compatible with CMSMS version 2.2.9 and below. | https://github.com/Mahamedm/CVE-2019-9053-Exploit-Python-3 | POC详情 |
| 10 | This is the Updated Python3 exploit for CVE-2019-9053 | https://github.com/im-suman-roy/CVE-2019-9053 | POC详情 |
| 11 | None | https://github.com/bthnrml/guncel-cve-2019-9053.py | POC详情 |
| 12 | Original Exploit Source: https://www.exploit-db.com/exploits/46635 | https://github.com/kahluri/CVE-2019-9053 | POC详情 |
| 13 | Python3 version of the Python2 exploit for CVE-2019-9053 | https://github.com/Doc0x1/CVE-2019-9053-Python3 | POC详情 |
| 14 | This repository has the sole purpose of rewriting the CVE-2019-9053 script, which in the original publication is written in Python 2.7. I will be using Python 3. | https://github.com/fernandobortotti/CVE-2019-9053 | POC详情 |
| 15 | Improved code of Daniele Scanu SQL Injection exploit | https://github.com/byrek/CVE-2019-9053 | POC详情 |
| 16 | working exploit for CVE-2019-9053 | https://github.com/davcwikla/CVE-2019-9053-exploit | POC详情 |
| 17 | None | https://github.com/BjarneVerschorre/CVE-2019-9053 | POC详情 |
| 18 | None | https://github.com/H3xL00m/CVE-2019-9053 | POC详情 |
| 19 | None | https://github.com/n3ov4n1sh/CVE-2019-9053 | POC详情 |
| 20 | None | https://github.com/c0d3cr4f73r/CVE-2019-9053 | POC详情 |
| 21 | None | https://github.com/Jason-Siu/CVE-2019-9053-Exploit-in-Python-3 | POC详情 |
| 22 | CVE-2019-9054 exploit added support for python3 + bug fixes | https://github.com/FedericoTorres233/CVE-2019-9053-Fixed | POC详情 |
| 23 | This script is a modified version of the original exploit by Daniele Scanu which exploits an unauthenticated SQL injection vulnerability in CMS Made Simple <= 2.2.10 (CVE-2019-9053). | https://github.com/Dh4nuJ4/SimpleCTF-UpdatedExploit | POC详情 |
| 24 | The script has been remastered by Teymur Novruzov to ensure compatibility with Python 3. This tool is intended for educational purposes only. Unauthorized use of this tool on any system or network without permission is illegal. The author is not responsible for any misuse of this tool. | https://github.com/TeymurNovruzov/CVE-2019-9053-python3-remastered | POC详情 |
| 25 | None | https://github.com/Sp3c73rSh4d0w/CVE-2019-9053 | POC详情 |
| 26 | None | https://github.com/0xwh1pl4sh/CVE-2019-9053 | POC详情 |
| 27 | None | https://github.com/N3rdyN3xus/CVE-2019-9053 | POC详情 |
| 28 | None | https://github.com/jtoalu/CTF-CVE-2019-9053-GTFOBins | POC详情 |
| 29 | None | https://github.com/Azrenom/CMS-Made-Simple-2.2.9-CVE-2019-9053 | POC详情 |
| 30 | None | https://github.com/NyxByt3/CVE-2019-9053 | POC详情 |
| 31 | None | https://github.com/h3xcr4ck3r/CVE-2019-9053 | POC详情 |
| 32 | CVE-2019-9053 rewritten in python3 to fix broken syntax. Affects CMS made simple <2.2.10 | https://github.com/louisthedonothing/CVE-2019-9053 | POC详情 |
| 33 | None | https://github.com/n3rdh4x0r/CVE-2019-9053 | POC详情 |
| 34 | CMS Made Simple < 2.2.10 - SQL Injection python3 | https://github.com/Yzhacker/CVE-2019-9053-CMS46635-python3 | POC详情 |
| 35 | This exploit targets an unauthenticated SQL injection vulnerability in CMS Made Simple <= 2.2.9 (CVE-2019-9053). It uses a time-based blind SQL injection to extract the username, email, and password hash from the database. Additionally, it supports password cracking using a wordlist. | https://github.com/hf3cyber/CMS-Made-Simple-2.2.9-Unauthenticated-SQL-Injection-Exploit-CVE-2019-9053- | POC详情 |
| 36 | Unauthenticated SQL injection exploit for CVE-2019-9053 in CMS Made Simple <= 2.2.9. Extracts admin creds with time-based SQLi. | https://github.com/so1icitx/CVE-2019-9053 | POC详情 |
| 37 | None | https://github.com/Threekiii/Awesome-POC/blob/master/CMS%E6%BC%8F%E6%B4%9E/CMS%20Made%20Simple%20%28CMSMS%29%20%E5%89%8D%E5%8F%B0SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E%20CVE-2019-9053.md | POC详情 |
| 38 | https://github.com/vulhub/vulhub/blob/master/cmsms/CVE-2019-9053/README.md | POC详情 | |
| 39 | CVE-2019-9053. | https://github.com/del0x3/CVE-2019-9053-port-py3 | POC详情 |
| 40 | CMS Made Simple ≤ 2.2.9 SQL Injection Vulnerability CVE-2019-9053 is a vulnerability found in CMS Made Simple (CMSMS) versions up to 2.2.9, where the application is vulnerable to a blind time-based SQL injection | https://github.com/kaizoku73/CVE-2019-9053 | POC详情 |
| 41 | Exploits Python cve-2019-9053– by HackHeart | https://github.com/Hackheart-tech/-exploit-lab | POC详情 |
| 42 | This is modified code of 46635 exploit from python2 to python3. | https://github.com/d3athcod3/46635.py_CVE-2019-9053 | POC详情 |
| 43 | None | https://github.com/h3x0v3rl0rd/CVE-2019-9053 | POC详情 |
| 44 | CVE-2019-9054 exploit added support for python3 + bug fixes | https://github.com/0xftorres/CVE-2019-9053-Fixed | POC详情 |
| 45 | None | https://github.com/Kalidas-7/CVE-2019-9053 | POC详情 |
| 46 | None | https://github.com/noob-hacker572/CMS-Made-Simple-2.2.9-CVE-2019-9053 | POC详情 |
| 47 | This repository contains the corrected code for CVE: 2019-9053 | https://github.com/Slayerma/-CVE-2019-9053 | POC详情 |
| 48 | None | https://github.com/CaelumIsMe/CVE-2019-9053-POC | POC详情 |
| 49 | None | https://github.com/6iroc/CVE-2019-9053 | POC详情 |
| 50 | Python3-converted exploit and research notes for CMS Made Simple (CVE-2019-9053) — Unauthenticated SQL Injection vulnerability. Includes original PoC, improved Python3 version, usage instructions, and lab testing reference. | https://github.com/JagdeepSinghCeh/cms-made-simple-python3 | POC详情 |
| 51 | CMS Made Simple < 2.2.10 - SQL Injection . Actual working version | https://github.com/Perseus99999/CVE-2019-9053-working- | POC详情 |
| 52 | This repository is a complete walkthrough of the Simple CTF challenge on TryHackMe, featuring Nmap scanning, directory enumeration with Gobuster, exploitation of CVE-2019-9053, SSH access, and privilege escalation via sudo permissions. | https://github.com/Praditha29/Simple-CTF-THM-Writeup | POC详情 |
| 53 | None | https://github.com/Boon-Rekcah/CMS-Made-Simple-2.2.9-CVE-2019-9053 | POC详情 |
| 54 | Python3 exploit for CVE-2019-9053 (CMS Made Simple <= 2.2.9 SQLi). No deps, time-based blind SQLi → admin creds dump. HTB Writeup owned. | https://github.com/tim-karov/cmsms-sqli | POC详情 |
| 55 | This is a modified version of the time-based SQL injection exploit for CMS Made Simple <= 2.2.9. The exploit was originally created by Daniele Scanu and has been updated for better compatibility and modern Python practices. | https://github.com/pasan2002/CVE-2019-9053---CMS-Made-Simple-SQL-Injection-Exploit-Modified- | POC详情 |
未找到公开 POC。
登录以生成 AI POC暂无评论