Successfully exploiting these issues may allow an attacker to compromise the application, access or modify data, exploit latent vulnerabilities in the underlying database, or execute arbitrary code in the context of the application.
Vendor Status:
Vendor as issued an updated vulnerability.