Invision Power Board (IPB) before 2.1.6 allows remote attackers to execute arbitrary PHP script via attack vectors involving (1) the post_icon variable in classes/post/class_post.php and (2) the df value in action_public/moderate.php.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 00:11
Type | Values Removed | Values Added |
---|---|---|
References | () http://attrition.org/pipermail/vim/2006-May/000776.html - | |
References | () http://forums.invisionpower.com/index.php?act=Attach&type=post&id=10026 - Patch | |
References | () http://forums.invisionpower.com/index.php?showtopic=215527 - Patch | |
References | () http://secunia.com/advisories/20158 - Patch, Vendor Advisory | |
References | () http://www.osvdb.org/25667 - | |
References | () http://www.osvdb.org/25668 - | |
References | () http://www.securityfocus.com/bid/18040 - | |
References | () http://www.vupen.com/english/advisories/2006/1859 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/26541 - |
Information
Published : 2006-05-20 03:02
Updated : 2024-11-21 00:11
NVD link : CVE-2006-2498
Mitre link : CVE-2006-2498
CVE.ORG link : CVE-2006-2498
JSON object : View
Products Affected
invision_power_services
- invision_power_board
CWE