Description
|
|
Multiple vulnerabilities were identified in MySQL Eventum, which could be exploited by attackers to perform SQL injection or cross site scripting.
The first issue is due to an input validation error in the "view.php", "list.php", and "get_jsrs_data.ph" scripts when processing specially crafted "id", "release", and "F" parameters, which may be exploited by attackers to cause arbitrary scripting code to be executed by the user's browser.
The second vulnerability is due to an input validation error in the the authentication, release, and report classes that do not properly filter specially crafted variables, which may be exploited by remote users to conduct SQL injection attacks.
|