Page 9 of 62 results (0.038 seconds)

CVSS: 7.5EPSS: 0%CPEs: 10EXPL: 1

SQL injection vulnerability in index.php in Invision Power Board allows remote attackers to execute arbitrary SQL commands via the pid parameter in a reputation action. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. • https://www.exploit-db.com/exploits/27818 http://www.securityfocus.com/bid/17839 •

CVSS: 7.5EPSS: 1%CPEs: 26EXPL: 2

SQL injection vulnerability in func_msg.php in Invision Power Board (IPB) 2.1.4 allows remote attackers to execute arbitrary SQL commands via the from_contact field in a private message (PM). • https://www.exploit-db.com/exploits/1733 http://secunia.com/advisories/19861 http://securityreason.com/securityalert/813 http://www.osvdb.org/25021 http://www.securityfocus.com/archive/1/432248/100/0/threaded http://www.securityfocus.com/bid/17719 https://exchange.xforce.ibmcloud.com/vulnerabilities/26107 •

CVSS: 6.4EPSS: 2%CPEs: 2EXPL: 0

Directory traversal vulnerability in action_admin/paysubscriptions.php in Invision Power Board (IPB) 2.1.x and 2.0.x before 20060425 allows remote authenticated administrators to include and execute arbitrary local PHP files via a .. (dot dot) in the name parameter, preceded by enough backspace (%08) characters to erase the initial static portion of a filename. • http://forums.invisionpower.com/index.php?showtopic=213374 http://secunia.com/advisories/19830 http://securityreason.com/securityalert/796 http://www.osvdb.org/25008 http://www.securityfocus.com/archive/1/431990/100/0/threaded http://www.securityfocus.com/archive/1/432226/100/0/threaded http://www.securityfocus.com/archive/1/439607/100/0/threaded http://www.vupen.com/english/advisories/2006/1534 https://exchange.xforce.ibmcloud.com/vulnerabilities/26072 •

CVSS: 5.0EPSS: 82%CPEs: 1EXPL: 1

action_public/search.php in Invision Power Board (IPB) 2.1.x and 2.0.x before 20060425 allows remote attackers to execute arbitrary PHP code via a search with a crafted value of the lastdate parameter, which alters the behavior of a regular expression to add a "#e" (execute) modifier. • https://www.exploit-db.com/exploits/1720 http://forums.invisionpower.com/index.php?showtopic=213374 http://secunia.com/advisories/19830 http://securityreason.com/securityalert/796 http://www.osvdb.org/25005 http://www.securityfocus.com/archive/1/431990/100/0/threaded http://www.securityfocus.com/archive/1/432226/100/0/threaded http://www.securityfocus.com/archive/1/432451/100/0/threaded http://www.securityfocus.com/archive/1/439607/100/0/threaded http://www.securityfocus. •

CVSS: 5.0EPSS: 3%CPEs: 13EXPL: 1

SQL injection vulnerability in lib/func_taskmanager.php in Invision Power Board (IPB) 2.1.x and 2.0.x before 20060425 allows remote attackers to execute arbitrary SQL commands via the ck parameter, which can inject at most 32 characters. • https://www.exploit-db.com/exploits/27736 http://forums.invisionpower.com/index.php?showtopic=213374 http://secunia.com/advisories/19830 http://securityreason.com/securityalert/796 http://www.securityfocus.com/archive/1/431990/100/0/threaded http://www.securityfocus.com/archive/1/432226/100/0/threaded http://www.securityfocus.com/bid/17690 http://www.vupen.com/english/advisories/2006/1534 https://exchange.xforce.ibmcloud.com/vulnerabilities/26071 •