This exploit demonstrates a SQL injection vulnerability in Quick Count 2.0 via the 'txtInstID' parameter in QCVote.php. The PoC includes a crafted HTTP POST request that extracts database information such as user, database name, and version.
Classification
Working Poc 90%
Attack Type
Sqli
Complexity
Trivial
Reliability
Reliable
Target:Quick Count 2.0
No auth needed
Prerequisites:Access to the target web application · Network connectivity to the target server