A specially-crafted HTTP request can lead to SQL injection. An attacker can make authenticated HTTP requests to trigger this vulnerability at ord’ parameter. However, the high privilege super-adminis ...……
作者:菜鸟教程小白
|
时间:2022-2-5 12:43
|
阅读:25
|
回复:0