PoC-in-GitHub/2019/CVE-2019-9053.json
2025-03-07 03:12:43 +09:00

126 lines
No EOL
4.9 KiB
JSON

[
{
"id": 646948182,
"name": "CVE-2019-9053-Exploit-Python-3",
"full_name": "Mahamedm\/CVE-2019-9053-Exploit-Python-3",
"owner": {
"login": "Mahamedm",
"id": 52294485,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/52294485?v=4",
"html_url": "https:\/\/github.com\/Mahamedm",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Mahamedm\/CVE-2019-9053-Exploit-Python-3",
"description": "The exploit is edited to work with different text encodings and Python 3 and is compatible with CMSMS version 2.2.9 and below.",
"fork": false,
"created_at": "2023-05-29T17:59:09Z",
"updated_at": "2025-02-10T13:43:17Z",
"pushed_at": "2025-02-10T13:43:12Z",
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 5,
"score": 0,
"subscribers_count": 1
},
{
"id": 878999702,
"name": "CVE-2019-9053",
"full_name": "louisthedonothing\/CVE-2019-9053",
"owner": {
"login": "louisthedonothing",
"id": 132141811,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/132141811?v=4",
"html_url": "https:\/\/github.com\/louisthedonothing",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/louisthedonothing\/CVE-2019-9053",
"description": "CVE-2019-9053 rewritten in python3 to fix broken syntax. Affects CMS made simple <2.2.10",
"fork": false,
"created_at": "2024-10-26T17:26:05Z",
"updated_at": "2024-12-02T13:14:22Z",
"pushed_at": "2024-12-02T13:14:19Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 932312361,
"name": "CVE-2019-9053-CMS46635-python3",
"full_name": "Yzhacker\/CVE-2019-9053-CMS46635-python3",
"owner": {
"login": "Yzhacker",
"id": 68428197,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/68428197?v=4",
"html_url": "https:\/\/github.com\/Yzhacker",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Yzhacker\/CVE-2019-9053-CMS46635-python3",
"description": "CMS Made Simple < 2.2.10 - SQL Injection python3",
"fork": false,
"created_at": "2025-02-13T17:57:02Z",
"updated_at": "2025-02-14T01:33:52Z",
"pushed_at": "2025-02-14T01:33:48Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 943296839,
"name": "CMS-Made-Simple-2.2.9-Unauthenticated-SQL-Injection-Exploit-CVE-2019-9053-",
"full_name": "hf3cyber\/CMS-Made-Simple-2.2.9-Unauthenticated-SQL-Injection-Exploit-CVE-2019-9053-",
"owner": {
"login": "hf3cyber",
"id": 97282625,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/97282625?v=4",
"html_url": "https:\/\/github.com\/hf3cyber",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/hf3cyber\/CMS-Made-Simple-2.2.9-Unauthenticated-SQL-Injection-Exploit-CVE-2019-9053-",
"description": "This exploit targets an unauthenticated SQL injection vulnerability in CMS Made Simple <= 2.2.9 (CVE-2019-9053). It uses a time-based blind SQL injection to extract the username, email, and password hash from the database. Additionally, it supports password cracking using a wordlist.",
"fork": false,
"created_at": "2025-03-05T13:35:20Z",
"updated_at": "2025-03-05T14:26:15Z",
"pushed_at": "2025-03-05T14:26:11Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]