Remote attackers can inject JavaScript code without the need of authorization. Exploiting this vulnerability, attackers can steal consumer credentials or execute steps which include injecting destructive scripts or https://safaafoe395541.dbblog.net/3066780/a-review-of-mysql-health-check-company