$ Title: C@mo CMS SQL Injection Vulnerability
$ Version: All Version
$ Author: P0W3RFU7
$ Email: Pandidan@Gmail.com
=-=-=-=-=-=-=-=-=-=-=-=-(Vulnerability Details)-=-=-=-=-=-=-=-=-=-=-=-=
$ Affects: default.asp?id=SQLi
$ Dork: "Powered by C@mo CMS"
$ Sample: http://www.vuln.com/default.asp?id=SQLi
$ Demo: http://www.cons.sm/default.asp?id=1898
=-=-=-=-=-=-=-=-=-=-=-=-=-=(Thanks)=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
HUrr!c4nE - Cair3x - black.shadowes - hadihadi - iM4n - Mormoroth - irsdl
Mr.Hesy - 4m!n - Dj7xpl - Sc0rpion - Expl0its - The-0utl4w - Mikili
Net.Edit0r - md.r00t - S3Ri0uS - NeFrin - Skitt3r & My Best Friend Takpar