Exploiting these vulnerabilities could allow an attacker to execute arbitrary script code, steal cookie-based authentication credentials, compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database and access sensitive data which may be used to launch further attacks against a vulnerable computer.
Vendor Status:
Vendor as issued an updated vulnerability.