Page 6 of 35 results (0.008 seconds)

CVSS: 6.4EPSS: 3%CPEs: 19EXPL: 0

Invision Power Board (IPB) before 2.1.6 allows remote attackers to execute arbitrary PHP script via attack vectors involving (1) the post_icon variable in classes/post/class_post.php and (2) the df value in action_public/moderate.php. • http://attrition.org/pipermail/vim/2006-May/000776.html http://forums.invisionpower.com/index.php?act=Attach&type=post&id=10026 http://forums.invisionpower.com/index.php?showtopic=215527 http://secunia.com/advisories/20158 http://www.osvdb.org/25667 http://www.osvdb.org/25668 http://www.securityfocus.com/bid/18040 http://www.vupen.com/english/advisories/2006/1859 https://exchange.xforce.ibmcloud.com/vulnerabilities/26541 •

CVSS: 5.5EPSS: 0%CPEs: 19EXPL: 0

SQL injection vulnerability in the topic deletion functionality (post_delete function in func_mod.php) for Invision Power Board 2.1.5 allows remote authenticated moderators to execute arbitrary SQL commands via the selectedpids parameter, which bypasses an integer value check when the $id variable is an array. • http://forums.invisionpower.com/index.php?showtopic=214248&view=getnewpo http://secunia.com/advisories/19901 http://securityreason.com/securityalert/551 http://www.securityfocus.com/archive/1/432591/100/0/threaded http://www.securityfocus.com/archive/1/432948/30/0/threaded http://www.securityfocus.com/bid/17837 http://www.vupen.com/english/advisories/2006/1605 https://exchange.xforce.ibmcloud.com/vulnerabilities/26190 •

CVSS: 7.5EPSS: 0%CPEs: 10EXPL: 1

SQL injection vulnerability in index.php in Invision Power Board allows remote attackers to execute arbitrary SQL commands via the pid parameter in a reputation action. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. • https://www.exploit-db.com/exploits/27818 http://www.securityfocus.com/bid/17839 •

CVSS: 7.5EPSS: 1%CPEs: 26EXPL: 2

SQL injection vulnerability in func_msg.php in Invision Power Board (IPB) 2.1.4 allows remote attackers to execute arbitrary SQL commands via the from_contact field in a private message (PM). • https://www.exploit-db.com/exploits/1733 http://secunia.com/advisories/19861 http://securityreason.com/securityalert/813 http://www.osvdb.org/25021 http://www.securityfocus.com/archive/1/432248/100/0/threaded http://www.securityfocus.com/bid/17719 https://exchange.xforce.ibmcloud.com/vulnerabilities/26107 •

CVSS: 6.8EPSS: 15%CPEs: 3EXPL: 0

Cross-site scripting (XSS) vulnerability in Invision Power Board (IPB) 2.1.5 and earlier before 20060308 allows remote attackers to inject arbitrary web script or HTML via a Private Message (PM) in certain circumstances. • http://forums.invisionpower.com/index.php?showtopic=209178 http://secunia.com/advisories/19299 http://www.securityfocus.com/bid/17187 http://www.vupen.com/english/advisories/2006/1044 https://exchange.xforce.ibmcloud.com/vulnerabilities/25384 •