Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| - | n/a | n/a | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | This is modified code of 46635 exploit from python2 to python3. | https://github.com/SUNNYSAINI01001/46635.py_CVE-2019-9053 | POC Details |
| 2 | None | https://github.com/crypticdante/CVE-2019-9053 | POC Details |
| 3 | update to Daniele Scanu's SQL Injection Exploit - CVE-2019-9053 | https://github.com/maraspiras/46635.py | POC Details |
| 4 | CVE-2019-9053 Exploit for Python 3 | https://github.com/e-renna/CVE-2019-9053 | POC Details |
| 5 | This is a exploit for CVE-2019-9053 | https://github.com/zmiddle/Simple_CMS_SQLi | POC Details |
| 6 | None | https://github.com/ELIZEUOPAIN/CVE-2019-9053-CMS-Made-Simple-2.2.10---SQL-Injection-Exploit | POC Details |
| 7 | CVE-2019-9053 exploit ported to python3 | https://github.com/pedrojosenavasperez/CVE-2019-9053-Python3 | POC Details |
| 8 | CMS Made Simple < 2.2.10 - SQL Injection | https://github.com/STERN3L/CVE-2019-9053 | POC Details |
| 9 | The exploit is edited to work with different text encodings and Python 3 and is compatible with CMSMS version 2.2.9 and below. | https://github.com/Mahamedm/CVE-2019-9053-Exploit-Python-3 | POC Details |
| 10 | This is the Updated Python3 exploit for CVE-2019-9053 | https://github.com/im-suman-roy/CVE-2019-9053 | POC Details |
| 11 | None | https://github.com/bthnrml/guncel-cve-2019-9053.py | POC Details |
| 12 | Original Exploit Source: https://www.exploit-db.com/exploits/46635 | https://github.com/kahluri/CVE-2019-9053 | POC Details |
| 13 | Python3 version of the Python2 exploit for CVE-2019-9053 | https://github.com/Doc0x1/CVE-2019-9053-Python3 | POC Details |
| 14 | This repository has the sole purpose of rewriting the CVE-2019-9053 script, which in the original publication is written in Python 2.7. I will be using Python 3. | https://github.com/fernandobortotti/CVE-2019-9053 | POC Details |
| 15 | Improved code of Daniele Scanu SQL Injection exploit | https://github.com/byrek/CVE-2019-9053 | POC Details |
| 16 | working exploit for CVE-2019-9053 | https://github.com/davcwikla/CVE-2019-9053-exploit | POC Details |
| 17 | None | https://github.com/BjarneVerschorre/CVE-2019-9053 | POC Details |
| 18 | None | https://github.com/H3xL00m/CVE-2019-9053 | POC Details |
| 19 | None | https://github.com/n3ov4n1sh/CVE-2019-9053 | POC Details |
| 20 | None | https://github.com/c0d3cr4f73r/CVE-2019-9053 | POC Details |
| 21 | None | https://github.com/Jason-Siu/CVE-2019-9053-Exploit-in-Python-3 | POC Details |
| 22 | CVE-2019-9054 exploit added support for python3 + bug fixes | https://github.com/FedericoTorres233/CVE-2019-9053-Fixed | POC Details |
| 23 | This script is a modified version of the original exploit by Daniele Scanu which exploits an unauthenticated SQL injection vulnerability in CMS Made Simple <= 2.2.10 (CVE-2019-9053). | https://github.com/Dh4nuJ4/SimpleCTF-UpdatedExploit | POC Details |
| 24 | The script has been remastered by Teymur Novruzov to ensure compatibility with Python 3. This tool is intended for educational purposes only. Unauthorized use of this tool on any system or network without permission is illegal. The author is not responsible for any misuse of this tool. | https://github.com/TeymurNovruzov/CVE-2019-9053-python3-remastered | POC Details |
| 25 | None | https://github.com/Sp3c73rSh4d0w/CVE-2019-9053 | POC Details |
| 26 | None | https://github.com/0xwh1pl4sh/CVE-2019-9053 | POC Details |
| 27 | None | https://github.com/N3rdyN3xus/CVE-2019-9053 | POC Details |
| 28 | None | https://github.com/jtoalu/CTF-CVE-2019-9053-GTFOBins | POC Details |
| 29 | None | https://github.com/Azrenom/CMS-Made-Simple-2.2.9-CVE-2019-9053 | POC Details |
| 30 | None | https://github.com/NyxByt3/CVE-2019-9053 | POC Details |
| 31 | None | https://github.com/h3xcr4ck3r/CVE-2019-9053 | POC Details |
| 32 | CVE-2019-9053 rewritten in python3 to fix broken syntax. Affects CMS made simple <2.2.10 | https://github.com/louisthedonothing/CVE-2019-9053 | POC Details |
| 33 | None | https://github.com/n3rdh4x0r/CVE-2019-9053 | POC Details |
| 34 | CMS Made Simple < 2.2.10 - SQL Injection python3 | https://github.com/Yzhacker/CVE-2019-9053-CMS46635-python3 | POC Details |
| 35 | This exploit targets an unauthenticated SQL injection vulnerability in CMS Made Simple <= 2.2.9 (CVE-2019-9053). It uses a time-based blind SQL injection to extract the username, email, and password hash from the database. Additionally, it supports password cracking using a wordlist. | https://github.com/hf3cyber/CMS-Made-Simple-2.2.9-Unauthenticated-SQL-Injection-Exploit-CVE-2019-9053- | POC Details |
| 36 | Unauthenticated SQL injection exploit for CVE-2019-9053 in CMS Made Simple <= 2.2.9. Extracts admin creds with time-based SQLi. | https://github.com/so1icitx/CVE-2019-9053 | POC Details |
| 37 | None | https://github.com/Threekiii/Awesome-POC/blob/master/CMS%E6%BC%8F%E6%B4%9E/CMS%20Made%20Simple%20%28CMSMS%29%20%E5%89%8D%E5%8F%B0SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E%20CVE-2019-9053.md | POC Details |
| 38 | https://github.com/vulhub/vulhub/blob/master/cmsms/CVE-2019-9053/README.md | POC Details | |
| 39 | CVE-2019-9053. | https://github.com/del0x3/CVE-2019-9053-port-py3 | POC Details |
| 40 | CMS Made Simple ≤ 2.2.9 SQL Injection Vulnerability CVE-2019-9053 is a vulnerability found in CMS Made Simple (CMSMS) versions up to 2.2.9, where the application is vulnerable to a blind time-based SQL injection | https://github.com/kaizoku73/CVE-2019-9053 | POC Details |
| 41 | Exploits Python cve-2019-9053– by HackHeart | https://github.com/Hackheart-tech/-exploit-lab | POC Details |
| 42 | This is modified code of 46635 exploit from python2 to python3. | https://github.com/d3athcod3/46635.py_CVE-2019-9053 | POC Details |
| 43 | None | https://github.com/h3x0v3rl0rd/CVE-2019-9053 | POC Details |
| 44 | CVE-2019-9054 exploit added support for python3 + bug fixes | https://github.com/0xftorres/CVE-2019-9053-Fixed | POC Details |
| 45 | None | https://github.com/Kalidas-7/CVE-2019-9053 | POC Details |
| 46 | None | https://github.com/noob-hacker572/CMS-Made-Simple-2.2.9-CVE-2019-9053 | POC Details |
| 47 | This repository contains the corrected code for CVE: 2019-9053 | https://github.com/Slayerma/-CVE-2019-9053 | POC Details |
| 48 | None | https://github.com/CaelumIsMe/CVE-2019-9053-POC | POC Details |
| 49 | None | https://github.com/6iroc/CVE-2019-9053 | POC Details |
| 50 | Python3-converted exploit and research notes for CMS Made Simple (CVE-2019-9053) — Unauthenticated SQL Injection vulnerability. Includes original PoC, improved Python3 version, usage instructions, and lab testing reference. | https://github.com/JagdeepSinghCeh/cms-made-simple-python3 | POC Details |
| 51 | CMS Made Simple < 2.2.10 - SQL Injection . Actual working version | https://github.com/Perseus99999/CVE-2019-9053-working- | POC Details |
| 52 | This repository is a complete walkthrough of the Simple CTF challenge on TryHackMe, featuring Nmap scanning, directory enumeration with Gobuster, exploitation of CVE-2019-9053, SSH access, and privilege escalation via sudo permissions. | https://github.com/Praditha29/Simple-CTF-THM-Writeup | POC Details |
| 53 | None | https://github.com/Boon-Rekcah/CMS-Made-Simple-2.2.9-CVE-2019-9053 | POC Details |
| 54 | Python3 exploit for CVE-2019-9053 (CMS Made Simple <= 2.2.9 SQLi). No deps, time-based blind SQLi → admin creds dump. HTB Writeup owned. | https://github.com/tim-karov/cmsms-sqli | POC Details |
| 55 | This is a modified version of the time-based SQL injection exploit for CMS Made Simple <= 2.2.9. The exploit was originally created by Daniele Scanu and has been updated for better compatibility and modern Python practices. | https://github.com/pasan2002/CVE-2019-9053---CMS-Made-Simple-SQL-Injection-Exploit-Modified- | POC Details |
No public POC found.
Login to generate AI POCNo comments yet