Page 11 of 73 results (0.004 seconds)

CVSS: 7.5EPSS: 0%CPEs: 2EXPL: 1

Multiple SQL injection vulnerabilities in Invision Blog before 1.1.2 Final allow remote attackers to execute arbitrary SQL commands via the (1) eid parameter to an editentry, replyentry, or editcomment action, or (2) the mid parameter to an aboutme action. • http://marc.info/?l=bugtraq&m=111833601302752&w=2 http://secunia.com/advisories/15626 http://www.gulftech.org/?node=research&article_id=00078-06072005 •

CVSS: 4.3EPSS: 0%CPEs: 2EXPL: 1

Cross-site scripting (XSS) vulnerability in the convert_highlite_words function in Invision Blog before 1.1.2 Final allows remote attackers to inject arbitrary web script or HTML via double hex encoded highlight data. • http://marc.info/?l=bugtraq&m=111833601302752&w=2 http://secunia.com/advisories/15626 http://www.gulftech.org/?node=research&article_id=00078-06072005 •

CVSS: 4.6EPSS: 0%CPEs: 17EXPL: 1

Invision Power Board (IPB) 1.0 through 2.0.4 allows non-root admins to add themselves or other users to the root admin group via the "Move users in this group to" screen. • http://archives.neohapsis.com/archives/fulldisclosure/2005-05/0635.html http://secunia.com/advisories/15545 http://www.securityfocus.com/bid/13797 •

CVSS: 5.0EPSS: 0%CPEs: 7EXPL: 2

Invision Power Board (IPB) 1.0 through 1.3 allows remote attackers to edit arbitrary forum posts via a direct request to index.php with modified parameters. • https://www.exploit-db.com/exploits/25741 http://www.securityfocus.com/bid/13802 •

CVSS: 7.5EPSS: 1%CPEs: 9EXPL: 4

SQL injection vulnerability in Invision Power Board (IPB) 2.0.3 and earlier allows remote attackers to execute arbitrary SQL commands via a crafted cookie password hash (pass_hash) that modifies the internal $pid variable. • https://www.exploit-db.com/exploits/1013 https://www.exploit-db.com/exploits/1014 https://www.exploit-db.com/exploits/43824 http://forums.invisionpower.com/index.php?showtopic=168016 http://marc.info/?l=bugtraq&m=111539908705851&w=2 http://marc.info/?l=bugtraq&m=111712587206834&w=2 http://secunia.com/advisories/15265 http://securitytracker.com/id?1013907 http://securitytracker.com/id? •