distant attackers can inject JavaScript code with no authorization. Exploiting this vulnerability, attackers can steal person credentials or execute actions for example injecting destructive scripts or redirecting users https://karimlisr005467.amoblog.com/5-easy-facts-about-mysql-database-health-check-described-51487192