Exploiting these issues could allow an attacker to execute arbitrary code, steal cookie-based authentication credentials, compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.
The vulnerability exists due to a failure in performing adequate boundary checks on user-supplied input. A remote attacker can exploit this vulnerability by sending a specially crafted request to the affected server, which could lead to the execution of arbitrary code with system-level privileges. Successful exploitation of this vulnerability would completely compromise the affected computers. Failed exploit attempts may result in a denial-of-service condition.
Card sharj is prone to multiple SQL-injection vulnerabilities because the application fails to sufficiently sanitize user-supplied data before using it in an SQL query. Exploiting these issues could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.
Local attackers can exploit these issues to obtain sensitive information or change the password of other users on the computer, without sufficient privileges.
net4visions is prone to multiple cross-site scripting vulnerabilities because it fails to sufficiently sanitize user-supplied data.An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and to launch other attacks.
Aspgwy Access is prone to a cross-site scripting vulnerability because it fails to properly sanitize user-supplied input. An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and to launch other attacks.
Toko LiteCMS is prone to an HTTP-response-splitting vulnerability and multiple cross-site scripting vulnerabilities. An attacker can execute arbitrary script code in the browser, steal authentication credentials, and manipulate web content. The vulnerability exists in Toko LiteCMS version 1.5.2.
This exploit allows an attacker to include local files on the server by manipulating the 'table' parameter in the login.php script of jsboard 2.0.10.
Multiple Ay Computer products are prone to multiple SQL-injection vulnerabilities because they fail to sufficiently sanitize user-supplied data before using it in an SQL query. Exploiting these issues could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.
The ASP Basit Haber Script is vulnerable to an SQL injection attack due to improper sanitization of user-supplied input used in an SQL query. An attacker can exploit this vulnerability to compromise the application, gain unauthorized access or modify data, and exploit vulnerabilities in the underlying database.