Tine is prone to multiple cross-site scripting vulnerabilities because the application fails to sufficiently sanitize user-supplied data. An attacker could exploit these vulnerabilities to execute arbitrary script code in the context of the affected website. This may allow the attacker to steal cookie-based authentication credentials and launch other attacks.
osCommerce is prone to a remote file upload and a file disclosure vulnerability. The issues occur because the application fails to adequately sanitize user-supplied input. An attacker can exploit these issues to upload a file and obtain an arbitrary file's content; other attacks are also possible.
Exploiting this issue will exhaust system resources and cause the application to crash, denying service to legitimate users.
The vulnerability exists in Splunk due to insufficient sanitization of user-supplied data. An attacker can exploit this vulnerability to execute arbitrary HTML and script code in the context of the affected site, potentially leading to the theft of authentication credentials and other attacks.
The Innovate Portal is vulnerable to a cross-site scripting (XSS) attack due to inadequate input sanitization. An attacker can exploit this vulnerability to inject and execute arbitrary HTML and script code within the context of the affected site. This can lead to the theft of authentication credentials and enable the attacker to launch further attacks.
The application fails to properly sanitize user-supplied input before using it in an SQL query. An attacker can exploit this vulnerability by injecting malicious SQL code into the 'iIDcat' parameter of the 'get_list.php' script.
These vulnerabilities allow an attacker to steal authentication credentials, compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.
The BT-Sondage-v112 application is affected by a remote file include vulnerability. The vulnerability exists in the gestion_sondage.php file, where an attacker can include a malicious file via the 'repertoire_visiteur' parameter. This can lead to remote code execution and unauthorized access to the server.
An attacker can exploit these vulnerabilities to access sensitive information, redirect victims to attacker-controlled sites, or steal authentication credentials to perform unauthorized actions
The vulnerability allows attackers to bypass certain security restrictions and gain access to the device.