Attackers can exploit these issues to access or modify data, exploit latent vulnerabilities in the underlying database, bypass certain security restrictions, gain administrative access, execute HTML and script code in the context of the affected site, steal cookie-based authentication credentials, control how the site is rendered to the user, and launch other attacks.