The attacker used the SQL injection vulnerability to gain access and then follow… – Bug Bounty Tips February 21, 2021February 21, 2021 PCIS Support Team Security The attacker used the SQL injection vulnerability to gain access and then followed with requests to additional resources. Once they obtained the … Related:No Related Posts