Q and A - Authenticated SQL InjectionSign up to our free email alerts service for instant vulnerability notifications!
Can be exploited remotely by combining with Cross-Site Request Forgery (CSRF).
|OWASP Top 10||A1: Injection|
|Publicly Published||2016-08-23 (11 months ago)|
|Added||2016-08-29 (11 months ago)|
|Last Updated||2016-08-29 (11 months ago)|
Copyright & License
|Copyright||All data and resources contained within this page and this web site is Copyright © The WPScan Team.|
|License||Some of this data may be used for non-commercial purposes, however, any potential commercial usage of this data will require a license. If you would like to inquire about a commercial license please contact us.|