# Exploit Title: Zylone IT Multiple Blind SQL Injection Vulnerability # Date: 2010-07-08 # Author: Callo # Software Link: http://www.zylone.com/ # Version: Unknown # Tested on: php 10101010101010101010101010101010101010101010101010101010101010101010101010101010 01 1 ~# Title: Zylone IT Multiple Blind SQL Injection Vulnerability 0 01 10101010101010101010101010101010101010101010101010101010101010101010101010101010 01 1 ~# Date: 2010-07-070 01 10101010101010101010101010101010101010101010101010101010101010101010101010101010 01 1 ~# Author: Callo 0 0 ~# Home: www.gsk2.org1 10 01010101010101010101010101010101010101010101010101010101010101010101010101010101 10 0 ~# Software Link: http://www.zylone.com/ 1 1 ~# Version: Unknow 0 ~# Tested on: php1 1 ~# Dork: Powered by Zylone IT0 0Powered By: Zylone IT 1 10 01010101010101010101010101010101010101010101010101010101010101010101010101010101 10 0 ~# Exploit: http://localhost/[PATH]/news_details.php?news_id=[BLIND SQLi]1 1 http://localhost/[PATH]/news.php?cat_id=[BLIND SQLi] 0 0 http://localhost/[PATH]/news_details.php?sec_id=[BLIND SQLi] 1 1 http://localhost/[PATH]/home.php?page_id=[BLIND SQLi]0 0 http://localhost/[PATH]/events.php?cat_id=[BLIND SQLi] 1 1 http://localhost/[PATH]/policy.php?sec_id=[BLIND SQLi] 0 01 01010101010101010101010101010101010101010101010101010101010101010101010101010101 10 0 ~# Greetz: Whivack 1 10 01010101010101010101010101010101010101010101010101010101010101010101010101010101
体验盒子