source: https://www.securityfocus.com/bid/14898/info Mall23 is prone to an SQL injection vulnerability. This is due to a lack of proper sanitization of user-supplied input before using it in an SQL query. Successful exploitation could result in a compromise of the application, disclosure or modification of data, or may permit an attacker to exploit vulnerabilities in the underlying database implementation. <form action="http://www.example.com/m23Basket/AddItem.asp?idProduct=6" method="POST"> <input type="hidden" name="idOption_Dropdown_2" value="'[SQL INJECTION]"> <input type="Submit" name="submit" value="Test Exploit"> </form>