This is a functional SQL injection exploit targeting DE Classifieds via the 'cat_id' parameter in 'showCat.php'. The exploit uses a UNION-based SQLi to extract user credentials (username and password) from the 'std_users' table.
Classification
Working Poc 95%
Target:
DE Classifieds (version unspecified)
No auth needed
Prerequisites:
Target application must be vulnerable to SQL injection in the 'cat_id' parameter · The 'std_users' table must exist with 'user_name' and 'password' columns