Multiple vulnerabilities have been identified in the software that may allow a remote attacker to carry out SQL injection and HTML injection attacks. An attacker may also gain unauthorized access to a user's account.
The software is prone to multiple vulnerabilities that allow remote attackers to carry out SQL injection and HTML injection attacks. These vulnerabilities may also lead to unauthorized access to user accounts.
Multiple vulnerabilities have been identified in the software that may allow a remote attacker to carry out SQL injection and HTML injection attacks. An attacker may also gain unauthorized access to a user's account.
An attacker can bypass security restrictions and gain access to and corrupt sensitive data through 'ALTER TABLE ... RENAME' operations. A denial-of-service condition occurs when multiple threads ALTER MERGE tables to change the UNION.
The Flash Messaging server is vulnerable to a remote denial of service attack. This vulnerability occurs when the server fails to handle exceptional conditions properly. By exploiting this vulnerability, a remote attacker can crash the server, resulting in a denial of service for legitimate users.
The vulnerability exists in Microsoft ASP.NET due to its failure in securing documents when handling malformed URI requests. An attacker can exploit this vulnerability to bypass authentication required to access files in secured directories.
DCP-Portal is prone to a HTTP response splitting vulnerability. The issue allows an attacker to manipulate how GET requests are handled, which could lead to various attacks and deceive client users.
DCP-Portal is prone to multiple HTML injection vulnerabilities. The software does not sufficiently filter data submitted via input fields in several scripts, which allows for the execution of hostile script code. This code can be injected into pages and rendered within the context of the vulnerable site, potentially leading to the theft of cookie-based authentication credentials and other attacks.
DCP-Portal is prone to multiple cross-site scripting vulnerabilities due to insufficient filtering of URI parameters supplied to several scripts. A remote attacker can exploit this vulnerability by creating a malicious link containing script code. When a legitimate user follows the link, the script code will be executed in their browser within the context of the vulnerable website. This can lead to theft of cookie-based authentication credentials and other attacks.