Page 6 of 58 results (0.004 seconds)

CVSS: 6.1EPSS: 0%CPEs: 1EXPL: 1

31 Dec 2004 — Cross-site scripting (XSS) vulnerability in Invision Power Board 1.3 Final allows remote attackers to execute arbitrary script as other users via the pop parameter in a chat action to index.php. • http://archives.neohapsis.com/archives/bugtraq/2004-03/0082.html •

CVSS: 10.0EPSS: 0%CPEs: 8EXPL: 0

18 Mar 2004 — SQL injection vulnerability in search.php for Invision Board Forum allows remote attackers to execute arbitrary SQL queries via the st parameter. • http://marc.info/?l=bugtraq&m=107799527428834&w=2 •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

18 Mar 2004 — Invision Power Board 1.3 Final allows remote attackers to gain sensitive information by selecting a file for "Personal Photo" that is not an image file, which displays the installation path in an error message. • http://marc.info/?l=bugtraq&m=107850510428567&w=2 •

CVSS: 6.8EPSS: 1%CPEs: 2EXPL: 2

18 Mar 2004 — Cross-site scripting (XSS) vulnerability in index.php for Invision Power Board 1.3 final allows remote attackers to execute arbitrary script as other users via the (1) c, (2) f, (3) showtopic, (4) showuser, or (5) username parameters. • http://marc.info/?l=bugtraq&m=107851589701916&w=2 •

CVSS: 9.8EPSS: 1%CPEs: 6EXPL: 1

03 Jan 2004 — SQL injection vulnerability in calendar.php for Invision Power Board 1.3 allows remote attackers to execute arbitrary SQL commands via the m parameter, which sets the $this->chosen_month variable. • http://forums.invisionpower.com/index.php?act=ST&f=1&t=108786 •

CVSS: 9.8EPSS: 2%CPEs: 1EXPL: 2

31 Dec 2003 — ipchat.php in Invision Power Board 1.1.1 allows remote attackers to execute arbitrary PHP code, if register_globals is enabled, by modifying the root_path parameter to reference a URL on a remote web server that contains the code. • https://www.exploit-db.com/exploits/22295 • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVSS: 9.8EPSS: 0%CPEs: 6EXPL: 0

31 Dec 2003 — Invision Power Services Invision Board 1.0 through 1.1.1, when a forum is password protected, stores the administrator password in a cookie in plaintext, which could allow remote attackers to gain access. • http://securityreason.com/securityalert/3276 •

CVSS: 7.5EPSS: 0%CPEs: 2EXPL: 0

01 Oct 2002 — The installation procedure for Invision Board suggests that users install the phpinfo.php program under the web root, which leaks sensitive information such as absolute pathnames, OS information, and PHP settings. El procedimiento de instalación en Invision Board sugiere que los usuarios instalen el programa phpinfo.php en la raíz del web, lo que filtra información sensible como nombres de rutas, información del SO, y configuración de php. • http://marc.info/?l=bugtraq&m=103290602609197&w=2 •