cpe:2.3:a:invision_power_services:invision_board:2.0_pdr3:*:*:*:*:*:*:*
SQL injection vulnerability in lib/func_taskmanager.php in Invision Power Board (IPB) 2.1.x and 2.0.x before 20060425 allows remote attackers to execute arbitrary SQL commands via the ck parameter, which can inject at most 32 characters.
Max CVSS
5.0
EPSS Score
3.27%
Published
2006-04-26
Updated
2018-10-18
Invision Power Board (IPB) 1.0.3 allows remote attackers to inject arbitrary web script or HTML via an attachment, which is automatically downloaded and processed as HTML.
Max CVSS
5.0
EPSS Score
1.37%
Published
2005-08-10
Updated
2016-10-18
Invision Power Board (IPB) 1.0 through 2.0.4 allows non-root admins to add themselves or other users to the root admin group via the "Move users in this group to" screen.
Max CVSS
4.6
EPSS Score
0.04%
Published
2005-06-01
Updated
2008-09-05
SQL injection vulnerability in Invision Power Board (IPB) 2.0.3 and earlier allows remote attackers to execute arbitrary SQL commands via a crafted cookie password hash (pass_hash) that modifies the internal $pid variable.
Max CVSS
7.5
EPSS Score
1.57%
Published
2005-05-16
Updated
2017-10-19
Cross-site scripting (XSS) vulnerability in (1) search.php and (2) topics.php for Invision Power Board (IPB) 2.0.3 and earlier allows remote attackers to inject arbitrary web script or HTML via the highlite parameter.
Max CVSS
4.3
EPSS Score
1.25%
Published
2005-05-16
Updated
2017-07-11
Cross-site scripting (XSS) vulnerability in Invision Power Board 2.0.2 and earlier allows remote attackers to inject arbitrary web script or HTML via an HTTP POST request.
Max CVSS
4.3
EPSS Score
0.10%
Published
2005-05-02
Updated
2008-09-05
SQL injection vulnerability in search.php for Invision Board Forum allows remote attackers to execute arbitrary SQL queries via the st parameter.
Max CVSS
10.0
EPSS Score
0.37%
Published
2004-11-23
Updated
2017-07-11
7 vulnerabilities found
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!