Eventy Online Scheduler V1.8 – Multiple Vulnerabilties
The SQL Injection vulnerability exists in the /eve_event.php file, where user-supplied input is not properly sanitized before being used in an SQL query. An attacker can exploit this vulnerability by sending a specially crafted HTTP request containing malicious SQL statements to the vulnerable script. The Cross Site Scripting vulnerability exists due to insufficient sanitization of user-supplied input in the 'selmonth' and 'selyear' parameters of the 'eventy.php' script. An attacker can exploit this vulnerability by sending a specially crafted HTTP request containing malicious JavaScript code to the vulnerable script. The Cross Site Request Forgery vulnerability exists due to the lack of proper validation of user-supplied input in the 'a_admins.php' script. An attacker can exploit this vulnerability by sending a specially crafted HTTP request containing malicious HTML code to the vulnerable script.