Full Disclosure: [KIS-2020-08] openSIS

This can be exploited by unauthenticated attackers to e.g. read sensitive data from the database through error-based SQL Injection attacks. 2) User input …

Related:

  • No Related Posts

Leave a Reply