Does anyone know why the DW application is detecting an SQL injection on the /Admin/Public/Stat2.aspx script.
/Admin/Public/Stat2.aspx?SessionID=q11ohvkf0ukl2fmxpkl5u0io&PageID=34&AreaID=1&width=1920&height=1080&col=24&referrer=http%3A%2F%2Fwebshop.test.com%2Fcatalogus%3FGroupID%3D%26PageNum%3D3%26View%3Dcategory_detail_SecondViewV2.cshtml%26bdTextSearch%3Dpomp&async=true&lan=nl-NL&engagement=0
The users get locked out on the SQL injection protection. But as far as I know this is a DW generated url, so we cannot change this. I solved the issue by turning off the IP lockout. But i'm currious why this happens.
Kind regards,
Ben