The Social Network Community application is vulnerable to an SQL injection attack due to insufficient sanitization of user-supplied data before using it in an SQL query. This vulnerability can be exploited by an attacker to compromise the application, gain unauthorized access or modify data, and potentially exploit other vulnerabilities in the database.
Flirt-Projekt is prone to an SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query. Exploiting this issue could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.
The XOOPS Module Zmagazine 1.0 (print.php) is vulnerable to a remote blind SQL injection exploit. This exploit allows an attacker to inject SQL queries into the articleid parameter of the print.php script, which can lead to unauthorized access to sensitive information such as usernames and passwords.
The vulnerability allows remote attackers to bypass the authentication mechanism and gain unauthorized access.
The vulnerability allows an attacker to execute arbitrary commands with SYSTEM-level privileges by exploiting a specific URL parameter in the Websense Triton software. Successful exploitation of this vulnerability will lead to the complete compromise of affected computers.
An attacker can execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This can lead to the theft of authentication credentials and other attacks.
The Owl Intranet Engine is prone to an authentication-bypass vulnerability. An attacker can exploit this issue to bypass the authentication process and gain administrative access to the application.
Nagios XI is prone to an HTML injection vulnerability and multiple cross-site scripting vulnerabilities because it fails to properly sanitize user-supplied input. Successful exploits will allow attacker-supplied HTML and script code to run in the context of the affected browser, potentially allowing the attacker to steal cookie-based authentication credentials or control how the site is rendered to the user. Other attacks are also possible.
Browser CRM is prone to multiple SQL-injection vulnerabilities and multiple cross-site scripting vulnerabilities because it fails to sufficiently sanitize user-supplied data. Exploiting these vulnerabilities could allow an attacker to steal cookie-based authentication credentials, compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.
Browser CRM is prone to multiple SQL-injection vulnerabilities and multiple cross-site scripting vulnerabilities because it fails to sufficiently sanitize user-supplied data. Exploiting these vulnerabilities could allow an attacker to steal cookie-based authentication credentials, compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.