A SQL injection vulnerability exists where an authenticated, low-privileged remote attacker could potentially alter scan DB content.
A SQL injection vulnerability exists where an authenticated, low-privileged remote attacker could potentially alter scan DB content.