10
CVSSv2

CVE-2012-5692

Published: 31/10/2012 Updated: 03/06/2020
CVSS v2 Base Score: 10 | Impact Score: 10 | Exploitability Score: 10
VMScore: 1000
Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

Unspecified vulnerability in admin/sources/base/core.php in Invision Power Board (aka IPB or IP.Board) 3.1.x up to and including 3.3.x has unknown impact and remote attack vectors.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

invisionpower invision power board 3.1.4

invisionpower invision power board 3.2.0

invisionpower invision power board 3.2.1

invisionpower invision power board 3.2.2

invisioncommunity invision power board 3.3.0

invisioncommunity invision power board 3.1.2

invisionpower invision power board 3.1.1

invisionpower invision power board 3.1.0

invisionpower invision power board 3.1.3

Exploits

<?php /* So this is the patch that sanitizes, static public function safeUnserialize( $serialized ) { // unserialize will return false for object declared with small cap o // as well as if there is any ws between O and : if ( is_string( $serialized ) && strpos( $serialized, "\0" ) === false ) { ...
## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions Please see the Metasploit # web site for more information on licensing and terms of use # metasploitcom/ ## require 'msf/core' class Metasploit3 < Msf::Exploit::Remote Rank = ExcellentRanking include Msf::Exploit ...
<?php /* ---------------------------------------------------------------- Invision Power Board <= 334 "unserialize()" PHP Code Execution ---------------------------------------------------------------- author: Egidio Romano aka EgiX mail: n0b0d13s[at]gmail[dot]com software link ...
Invision Power Board versions 334 and below unserialize() PHP code execution exploit ...
Invision Power Board versions 334 and below unserialize REGEX bypass exploit ...