ID PACKETSTORM:105343
Type packetstorm
Reporter kurdish hackers team
Modified 2011-09-27T00:00:00
Description
`===========================================================
Vanira-cms Remote SQL insertion Vulnerability
-----------------------------------------------------------
foun by :kurdish hackers team
group : kurd-team
contact : pshela@yahoo.com
site : kurdteam.org
-----------------------------------------------------------
------------------------script-----------------------------
-----------------------------------------------------------
script name: Vanira-cms iran php script
site home : http://tursweb.com
price : BY Iran MonY
-----------------------------------------------------------
Exploit:
--------
voteshow.php?vact=ok&vtpidshow=1 [SQL insertion attacks]
live site :
http://melikaco.ir/voteshow.php?vact=ok&vtpidshow=1
-----------------------------------------------------------
Zryan_kurd ,r00t-SyS , all Member cold hackers team(cmg-team.com) , all kurdish hackers
-----------------------------------------------------------
================================================================
`
{"hash": "604ae0bc9398fca78c2529f0540bb839889782a0fdbd2ed9c96b792ff3a56073", "sourceHref": "https://packetstormsecurity.com/files/download/105343/vaniracms-sql.txt", "title": "Vanira CMS SQL Injection", "id": "PACKETSTORM:105343", "published": "2011-09-27T00:00:00", "description": "", "modified": "2011-09-27T00:00:00", "sourceData": "`=========================================================== \nVanira-cms Remote SQL insertion Vulnerability \n----------------------------------------------------------- \nfoun by :kurdish hackers team \ngroup : kurd-team \ncontact : pshela@yahoo.com \nsite : kurdteam.org \n----------------------------------------------------------- \n------------------------script----------------------------- \n----------------------------------------------------------- \nscript name: Vanira-cms iran php script \nsite home : http://tursweb.com \nprice : BY Iran MonY \n----------------------------------------------------------- \n \nExploit: \n-------- \nvoteshow.php?vact=ok&vtpidshow=1 [SQL insertion attacks] \n \nlive site : \nhttp://melikaco.ir/voteshow.php?vact=ok&vtpidshow=1 \n----------------------------------------------------------- \nZryan_kurd ,r00t-SyS , all Member cold hackers team(cmg-team.com) , all kurdish hackers \n----------------------------------------------------------- \n================================================================ \n`\n", "reporter": "kurdish hackers team", "hashmap": [{"key": "bulletinFamily", "hash": "708697c63f7eb369319c6523380bdf7a"}, {"key": "cvelist", "hash": "d41d8cd98f00b204e9800998ecf8427e"}, {"key": "cvss", "hash": "d4be9c4fc84262b4f39f89565918568f"}, {"key": "description", "hash": "d41d8cd98f00b204e9800998ecf8427e"}, {"key": "href", "hash": "91d84dc2e1605e7f4dccdecbc922337e"}, {"key": "modified", "hash": "f45129bb3d9005bcd16fde090e8cec83"}, {"key": "objectVersion", "hash": "56765472680401499c79732468ba4340"}, {"key": "published", "hash": "f45129bb3d9005bcd16fde090e8cec83"}, {"key": "references", "hash": "d41d8cd98f00b204e9800998ecf8427e"}, {"key": "reporter", "hash": "a296bba1568fefd1e2bb5a14917b0030"}, {"key": "sourceData", "hash": "93d76a5c515d20e9faf5c83803ec062f"}, {"key": "sourceHref", "hash": "47b153283dac068d233ababaaf228b3e"}, {"key": "title", "hash": "615e9dfa58401675cf5c8ad60a2388e4"}, {"key": "type", "hash": "6466ca3735f647eeaed965d9e71bd35d"}], "cvss": {"vector": "NONE", "score": 0.0}, "references": [], "type": "packetstorm", "cvelist": [], "history": [], "bulletinFamily": "exploit", "objectVersion": "1.2", "edition": 1, "href": "https://packetstormsecurity.com/files/105343/Vanira-CMS-SQL-Injection.html", "lastseen": "2016-11-03T10:27:36", "viewCount": 0, "enchantments": {"vulnersScore": 4.3}}
{"result": {}}