Page 4 of 58 results (0.006 seconds)

CVSS: 9.8EPSS: 0%CPEs: 2EXPL: 0

19 Mar 2006 — Multiple SQL injection vulnerabilities in Invision Power Board (IPB) 2.0.4 and 2.1.4 before 20060105 allow remote attackers to execute arbitrary SQL commands via cookies, related to (1) arrays of id/stamp pairs and (2) the keys in arrays of key/value pairs in ipsclass.php; (3) the topics variable in usercp.php; and the topicsread cookie in (4) topics.php, (5) search.php, and (6) forums.php. • http://forums.invisionpower.com/index.php?act=Attach&type=post&id=9642 •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 1

19 Mar 2006 — Invision Power Board 2.1.4 allows remote attackers to hijack sessions and possibly gain administrative privileges by obtaining the session ID from the s parameter, then replaying it in another request. • http://www.securityfocus.com/archive/1/427751/100/0/threaded •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 2

09 Mar 2006 — SQL injection vulnerability in index.php, possibly during a showtopic operation, in Invision Power Board (IPB) 2.1.5 allows remote attackers to execute arbitrary SQL commands via the st parameter. • https://www.exploit-db.com/exploits/27361 •

CVSS: 9.1EPSS: 0%CPEs: 15EXPL: 0

28 Feb 2006 — Invision Power Board (IPB) 2.1.4 and earlier allows remote attackers to view sensitive information via a direct request to multiple PHP scripts that include the full path in error messages, including (1) PEAR/Text/Diff/Renderer/inline.php, (2) PEAR/Text/Diff/Renderer/unified.php, (3) PEAR/Text/Diff3.php, (4) class_db.php, (5) class_db_mysql.php, and (6) class_xml.php in the ips_kernel/ directory; (7) mysql_admin_queries.php, (8) mysql_extra_queries.php, (9) mysql_queries.php, and (10) mysql_subsm_queries.ph... • http://neosecurityteam.net/advisories/Advisory-16.txt •

CVSS: 7.5EPSS: 0%CPEs: 15EXPL: 0

28 Feb 2006 — Invision Power Board (IPB) 2.1.4 and earlier allows remote attackers to list directory contents via a direct request to multiple directories, including (1) sources/loginauth/convert/, (2) sources/portal_plugins/, (3) cache/skin_cache/cacheid_2/, (4) ips_kernel/PEAR/, (5) ips_kernel/PEAR/Text/, (6) ips_kernel/PEAR/Text/Diff/, (7) ips_kernel/PEAR/Text/Diff/Renderer/, (8) style_images/1/folder_rte_files/, (9) style_images/1/folder_js_skin/, (10) style_images/1/folder_rte_images/, and (11) upgrade/ and its subd... • http://neosecurityteam.net/advisories/Advisory-16.txt •

CVSS: 7.5EPSS: 3%CPEs: 1EXPL: 3

25 Feb 2006 — index.php in Invision Power Board (IPB) 2.0.1, with Code Confirmation disabled, allows remote attackers to cause an unspecified denial of service by registering a large number of users. • https://www.exploit-db.com/exploits/12382 •

CVSS: 6.1EPSS: 1%CPEs: 1EXPL: 1

16 Nov 2005 — Cross-site scripting (XSS) vulnerability in Invision Power Board 2.1 allows remote attackers to inject arbitrary web script or HTML via the (1) adsess, (2) name, and (3) description parameters in admin.php, and the (4) ACP Notes, (5) Member Name, (6) Password, (7) Email Address, (8) Components, and multiple other input fields. Vulnerabilidad de secuencias de comandos en sitios cruzados (XSS) en Invision Power Board 2.1 permite a atacantes remotos inyectar web scritp o HTML de su elección mediante los paráme... • https://www.exploit-db.com/exploits/26478 •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

16 Nov 2005 — Directory traversal vulnerability in Task Manager in Invision Power Board (IP.Board) 2.0.1 allows limited remote attackers to include files via a .. (dot dot) in the "Task PHP File To Run" field. Vulnerabilidad de atravesammiento de directorios en Administrador de Tareas de Invision Power Board 2.0.1 (IP.Board) permite a atacantes remotos limitados incluir ficheros mediante un .. (punto punto) en el campo Task PHP File To Run. • http://secunia.com/advisories/17443 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 9.8EPSS: 1%CPEs: 1EXPL: 0

16 Nov 2005 — Direct code injection vulnerability in Task Manager in Invision Power Board 2.0.1 allows limited remote attackers to execute arbitrary code by referencing the file in "Task PHP File To Run" field and selecting "Run Task Now". Vulnerabilidad de inyección directa de código en Administrador de Tareas de Invision Power Board 2.0.1 permite a atacantes remotos limitados ejecutar código de su elección referenciando el fichero en el campo Task PHP File To Run y seleccionando Run Task Now. • http://secunia.com/advisories/17443 •

CVSS: 8.2EPSS: 2%CPEs: 10EXPL: 2

10 Aug 2005 — Invision Power Board (IPB) 1.0.3 allows remote attackers to inject arbitrary web script or HTML via an attachment, which is automatically downloaded and processed as HTML. • https://www.exploit-db.com/exploits/26104 •