TheHostingTool is prone to the following security vulnerabilities: 1. Multiple cross-site scripting vulnerabilities 2. An HTML-injection vulnerability 3. An arbitrary file-upload vulnerability 4. Multiple SQL-injection vulnerabilities An attacker can exploit these issues to execute attacker-supplied HTML or JavaScript code in the context of the affected site, to steal cookie-based authentication credentials, upload arbitrary files and compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database. TheHostingTool 1.2.6 is vulnerable; other versions may also be affected.
TheHostingTool is prone to the following security vulnerabilities: 1. Multiple cross-site scripting vulnerabilities 2. An HTML-injection vulnerability 3. An arbitrary file-upload vulnerability 4. Multiple SQL-injection vulnerabilities An attacker can exploit these issues to execute attacker-supplied HTML or JavaScript code in the context of the affected site, to steal cookie-based authentication credentials, upload arbitrary files and compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database. TheHostingTool 1.2.6 is vulnerable; other versions may also be affected.