Vulnerabilites related to invisionpower - ip.nexus
Vulnerability from fkie_nvd
Published
2014-07-03 14:55
Modified
2025-04-12 10:46
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in Invision Power IP.Board (aka IPB or Power Board) 3.3.x and 3.4.x through 3.4.6, as downloaded before 20140424, or IP.Nexus 1.5.x through 1.5.9, as downloaded before 20140424, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:invisioncommunity:invision_power_board:3.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "99FFCEE5-2A51-4D4A-A04E-74DA1A9EA7B2", "vulnerable": true }, { "criteria": "cpe:2.3:a:invisioncommunity:invision_power_board:3.3.0:alpha1:*:*:*:*:*:*", "matchCriteriaId": "784BFFC7-C237-47ED-AAE2-E6380427473A", "vulnerable": true }, { "criteria": "cpe:2.3:a:invisioncommunity:invision_power_board:3.3.0:alpha2:*:*:*:*:*:*", "matchCriteriaId": "1F58948C-552A-404B-94FE-D80869593E2E", "vulnerable": true }, { "criteria": "cpe:2.3:a:invisioncommunity:invision_power_board:3.3.0:beta1:*:*:*:*:*:*", "matchCriteriaId": "6008A365-6856-4A7D-AD7C-8614B5BEEE18", "vulnerable": true }, { "criteria": "cpe:2.3:a:invisioncommunity:invision_power_board:3.3.0:beta2:*:*:*:*:*:*", "matchCriteriaId": "C4F1DDBB-5896-4026-8EBF-4934F13576D8", "vulnerable": true }, { "criteria": "cpe:2.3:a:invisioncommunity:invision_power_board:3.3.0:beta3:*:*:*:*:*:*", "matchCriteriaId": "AEE3DB7A-530E-48D9-BA57-BFB524A203F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:invisioncommunity:invision_power_board:3.3.0:beta4:*:*:*:*:*:*", "matchCriteriaId": "6BDB1057-2279-4CC3-8CFB-69B10F772440", "vulnerable": true }, { "criteria": "cpe:2.3:a:invisioncommunity:invision_power_board:3.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "5AE613CF-1CEA-4B3E-9906-DD3B8C7CBCF4", "vulnerable": true }, { "criteria": "cpe:2.3:a:invisioncommunity:invision_power_board:3.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "A7D0EFE0-6468-4EBB-9AF6-A84B57531ED5", "vulnerable": true }, { "criteria": "cpe:2.3:a:invisioncommunity:invision_power_board:3.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "96CAB4DC-6817-4BB8-8665-B06861D67B4F", "vulnerable": true }, { "criteria": "cpe:2.3:a:invisioncommunity:invision_power_board:3.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "15F22F32-1FDB-469D-9478-49EBBDCB97B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:invisioncommunity:invision_power_board:3.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "4A777CF4-9BCE-49D4-9248-6BAA1966B1DF", "vulnerable": true }, { "criteria": "cpe:2.3:a:invisioncommunity:invision_power_board:3.4.0:alpha1:*:*:*:*:*:*", "matchCriteriaId": "55C99849-81C5-45A5-B3B8-0BFF62BF19C1", "vulnerable": true }, { "criteria": "cpe:2.3:a:invisioncommunity:invision_power_board:3.4.0:beta1:*:*:*:*:*:*", "matchCriteriaId": "83C25B54-AE40-4E6C-8969-6EFAD0C75604", "vulnerable": true }, { "criteria": "cpe:2.3:a:invisioncommunity:invision_power_board:3.4.0:beta2:*:*:*:*:*:*", "matchCriteriaId": "E81E98C8-E959-4E48-8BC1-118EF2CE7AB8", "vulnerable": true }, { "criteria": "cpe:2.3:a:invisioncommunity:invision_power_board:3.4.0:beta3:*:*:*:*:*:*", "matchCriteriaId": "AD21C54B-0118-4CD6-B0BF-5CBB31BC4BED", "vulnerable": true }, { "criteria": "cpe:2.3:a:invisioncommunity:invision_power_board:3.4.0:beta4:*:*:*:*:*:*", "matchCriteriaId": "2DBFC487-CADD-4410-8817-FD58DED0E5E9", "vulnerable": true }, { "criteria": "cpe:2.3:a:invisioncommunity:invision_power_board:3.4.0:beta5:*:*:*:*:*:*", "matchCriteriaId": "FBA34B41-7997-4A52-8D78-E0BFD798C4BA", "vulnerable": true }, { "criteria": "cpe:2.3:a:invisioncommunity:invision_power_board:3.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "73D08920-9F21-442A-BCE3-282EB724ED16", "vulnerable": true }, { "criteria": "cpe:2.3:a:invisioncommunity:invision_power_board:3.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "5C8719C2-4F1C-43A2-9476-AABE1E30E32C", "vulnerable": true }, { "criteria": "cpe:2.3:a:invisioncommunity:invision_power_board:3.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "9743ACA1-6623-4A88-85E1-BBB51906D1FA", "vulnerable": true }, { "criteria": "cpe:2.3:a:invisioncommunity:invision_power_board:3.4.4:*:*:*:*:*:*:*", "matchCriteriaId": "45415FB5-9CC7-4144-ACEE-E5DFB13AC6DA", "vulnerable": true }, { "criteria": "cpe:2.3:a:invisioncommunity:invision_power_board:3.4.5:*:*:*:*:*:*:*", "matchCriteriaId": "571CA374-11A2-44A9-B007-3F3D4247884A", "vulnerable": true }, { "criteria": "cpe:2.3:a:invisioncommunity:invision_power_board:3.4.6:*:*:*:*:*:*:*", "matchCriteriaId": "D52D8713-B5BA-43C2-BC46-02A2CD3950CF", "vulnerable": true }, { "criteria": "cpe:2.3:a:invisionpower:ip.nexus:1.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "BE3309A2-7A86-4329-AAEC-B4DF3F07D8A6", "vulnerable": true }, { "criteria": "cpe:2.3:a:invisionpower:ip.nexus:1.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "66328372-F96F-4D2F-9C40-2F496CB7FF43", "vulnerable": true }, { "criteria": "cpe:2.3:a:invisionpower:ip.nexus:1.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "BCC3D41B-97DB-49CD-AB03-70E57E315EF2", "vulnerable": true }, { "criteria": "cpe:2.3:a:invisionpower:ip.nexus:1.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "1433CDF0-81F0-4F19-A690-3F8CAF9218A3", "vulnerable": true }, { "criteria": "cpe:2.3:a:invisionpower:ip.nexus:1.5.4:*:*:*:*:*:*:*", "matchCriteriaId": "37E30710-C68D-48A7-AEC6-B90C3F827FA0", "vulnerable": true }, { "criteria": "cpe:2.3:a:invisionpower:ip.nexus:1.5.5:*:*:*:*:*:*:*", "matchCriteriaId": "BB5DFDCA-5F55-4DF8-973D-812A6F2A56E1", "vulnerable": true }, { "criteria": "cpe:2.3:a:invisionpower:ip.nexus:1.5.6:*:*:*:*:*:*:*", "matchCriteriaId": "D1288A3F-BC57-405A-A1E9-1C7496C659C3", "vulnerable": true }, { "criteria": "cpe:2.3:a:invisionpower:ip.nexus:1.5.7:*:*:*:*:*:*:*", "matchCriteriaId": "1DD12849-5960-4614-9ABC-37E63EE0CD64", "vulnerable": true }, { "criteria": "cpe:2.3:a:invisionpower:ip.nexus:1.5.8:*:*:*:*:*:*:*", "matchCriteriaId": "41F73B12-249D-46B7-82B4-BD9B30C772FF", "vulnerable": true }, { "criteria": "cpe:2.3:a:invisionpower:ip.nexus:1.5.9:*:*:*:*:*:*:*", "matchCriteriaId": "C7A3D453-8B96-483B-AE42-D885A3792FB7", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in Invision Power IP.Board (aka IPB or Power Board) 3.3.x and 3.4.x through 3.4.6, as downloaded before 20140424, or IP.Nexus 1.5.x through 1.5.9, as downloaded before 20140424, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors." }, { "lang": "es", "value": "Vulnerabilidad de XSS en Invision Power IP.Board (tambi\u00e9n conocido como IPB o Power Board) 3.3.x y 3.4.x hasta 3.4.6, descargado antes del 20140424, o IP.Nexus 1.5.x hasta 1.5.9, descargado antes del 20140424, permite a atacantes remotos inyectar secuencias de comandos web o HTML arbitrarios a trav\u00e9s de vectores no especificados." } ], "id": "CVE-2014-3149", "lastModified": "2025-04-12T10:46:40.837", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2014-07-03T14:55:07.020", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://community.invisionpower.com/topic/399747-ipboard-33x-34x-security-update" }, { "source": "cve@mitre.org", "url": "http://packetstormsecurity.com/files/127328/IP.Board-3.4.x-3.3.x-Cross-Site-Scripting.html" }, { "source": "cve@mitre.org", "url": "http://www.christian-schneider.net/advisories/CVE-2014-3149.txt" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/532618/100/0/threaded" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/67164" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://community.invisionpower.com/topic/399747-ipboard-33x-34x-security-update" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://packetstormsecurity.com/files/127328/IP.Board-3.4.x-3.3.x-Cross-Site-Scripting.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.christian-schneider.net/advisories/CVE-2014-3149.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/532618/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/67164" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
CVE-2014-3149 (GCVE-0-2014-3149)
Vulnerability from cvelistv5
Published
2014-07-03 14:00
Modified
2024-08-06 10:35
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Cross-site scripting (XSS) vulnerability in Invision Power IP.Board (aka IPB or Power Board) 3.3.x and 3.4.x through 3.4.6, as downloaded before 20140424, or IP.Nexus 1.5.x through 1.5.9, as downloaded before 20140424, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/archive/1/532618/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
http://www.christian-schneider.net/advisories/CVE-2014-3149.txt | x_refsource_MISC | |
http://packetstormsecurity.com/files/127328/IP.Board-3.4.x-3.3.x-Cross-Site-Scripting.html | x_refsource_MISC | |
http://community.invisionpower.com/topic/399747-ipboard-33x-34x-security-update | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/67164 | vdb-entry, x_refsource_BID |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T10:35:56.500Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20140701 CVE-2014-3149 - Reflected Cross-Site Scripting (XSS) in \"Invision Power IP.Board\"", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/532618/100/0/threaded" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.christian-schneider.net/advisories/CVE-2014-3149.txt" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/127328/IP.Board-3.4.x-3.3.x-Cross-Site-Scripting.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://community.invisionpower.com/topic/399747-ipboard-33x-34x-security-update" }, { "name": "67164", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/67164" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-04-24T00:00:00", "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in Invision Power IP.Board (aka IPB or Power Board) 3.3.x and 3.4.x through 3.4.6, as downloaded before 20140424, or IP.Nexus 1.5.x through 1.5.9, as downloaded before 20140424, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-09T18:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "20140701 CVE-2014-3149 - Reflected Cross-Site Scripting (XSS) in \"Invision Power IP.Board\"", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/532618/100/0/threaded" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.christian-schneider.net/advisories/CVE-2014-3149.txt" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/127328/IP.Board-3.4.x-3.3.x-Cross-Site-Scripting.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://community.invisionpower.com/topic/399747-ipboard-33x-34x-security-update" }, { "name": "67164", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/67164" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2014-3149", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cross-site scripting (XSS) vulnerability in Invision Power IP.Board (aka IPB or Power Board) 3.3.x and 3.4.x through 3.4.6, as downloaded before 20140424, or IP.Nexus 1.5.x through 1.5.9, as downloaded before 20140424, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20140701 CVE-2014-3149 - Reflected Cross-Site Scripting (XSS) in \"Invision Power IP.Board\"", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/532618/100/0/threaded" }, { "name": "http://www.christian-schneider.net/advisories/CVE-2014-3149.txt", "refsource": "MISC", "url": "http://www.christian-schneider.net/advisories/CVE-2014-3149.txt" }, { "name": "http://packetstormsecurity.com/files/127328/IP.Board-3.4.x-3.3.x-Cross-Site-Scripting.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/127328/IP.Board-3.4.x-3.3.x-Cross-Site-Scripting.html" }, { "name": "http://community.invisionpower.com/topic/399747-ipboard-33x-34x-security-update", "refsource": "CONFIRM", "url": "http://community.invisionpower.com/topic/399747-ipboard-33x-34x-security-update" }, { "name": "67164", "refsource": "BID", "url": "http://www.securityfocus.com/bid/67164" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2014-3149", "datePublished": "2014-07-03T14:00:00", "dateReserved": "2014-05-02T00:00:00", "dateUpdated": "2024-08-06T10:35:56.500Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }