- MultiCart 2.0 Remote Blind SQL Injection Vulnerbility -
Site: (URL to multicart site ie: http://www.site.com/multicart)
Table: (settings table name, default: "multicart_settings" others used: "mc_settings", "settings")
User: (Register on the site first, then enter username here)
Pass: (Register on the site first, then enter password here)
PID: (a valid product ID)
Output:
Notes: MultiCart uses the MD5 algorithms, The admin login is at /admin/
Coded By t0pP8uZz - h4ck-y0u.org