Invision Power Board (IPB) prior to 2.1.6 allows remote malicious users to execute arbitrary PHP script via attack vectors involving (1) the post_icon variable in classes/post/class_post.php and (2) the df value in action_public/moderate.php.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
invision power services invision power board 2.0.0 |
||
invision power services invision power board 2.1.1 |
||
invision power services invision power board 2.1.2 |
||
invision power services invision power board 2.1_beta4 |
||
invision power services invision power board 2.1_beta5 |
||
invision power services invision power board 2.0.1 |
||
invision power services invision power board 2.0.2 |
||
invision power services invision power board 2.1.3 |
||
invision power services invision power board 2.1.4 |
||
invision power services invision power board 2.1_rc1 |
||
invision power services invision power board 2.1 |
||
invision power services invision power board 2.1.0 |
||
invision power services invision power board 2.1_beta2 |
||
invision power services invision power board 2.1_beta3 |
||
invision power services invision power board 2.0.3 |
||
invision power services invision power board 2.0.4 |
||
invision power services invision power board 2.1.5 |
||
invision power services invision power board 2.1.6 |
||
invision power services invision power board 2.1_alpha2 |