The exploit demonstrates SQL injection vulnerabilities in Muviko Video CMS Script via the 'q' parameter in search.php and 'id' parameter in category.php. It uses UNION-based SQLi with concat_ws to extract user credentials (email, password, name) from the 'users' table.
Classification
Working Poc 95%
Attack Type
Sqli
Complexity
Trivial
Reliability
Reliable
Target:Muviko Video CMS Script
No auth needed
Prerequisites:Access to the vulnerable web application