This exploit demonstrates SQL injection vulnerabilities in Ticketly 1.0 via the 'name' parameter in POST requests. It includes payloads for boolean-based blind, error-based, and time-based blind SQLi, confirming the vulnerability's exploitability.
Classification
Working Poc 95%
Attack Type
Sqli
Complexity
Trivial
Reliability
Reliable
Target:Ticketly 1.0
No auth needed
Prerequisites:Access to the target application's POST endpoints