- MultiCart 2.0 Remote Blind SQL Injection Vulnerbility -

Site: (URL to multicart site ie: http://www.site.com/multicart)

Table: (settings table name, default: "multicart_settings" others used: "mc_settings", "settings")

User: (Register on the site first, then enter username here)

Pass: (Register on the site first, then enter password here)

PID: (a valid product ID)

Output:

Notes: MultiCart uses the MD5 algorithms, The admin login is at /admin/

Coded By t0pP8uZz - h4ck-y0u.org