This exploit demonstrates a SQL injection vulnerability in the 'slogan design Script' version 3.1, allowing an attacker to extract admin credentials from the 'users_admin' table via a crafted URL parameter.
Classification
Working Poc 90%
Attack Type
Sqli
Complexity
Trivial
Reliability
Reliable
Target:slogan design Script 3.1
No auth needed
Prerequisites:Access to the target web application · SQL injection vulnerability in the 'm_id' parameter