CVE-2015-6810
Published Sep 4, 2015
Last updated 9 years ago
Overview
- Description
- Cross-site scripting (XSS) vulnerability in Invision Power Services IPS Community Suite (aka Invision Power Board, IPB, or Power Board) 4.x before 4.0.12.1 allows remote authenticated users to inject arbitrary web script or HTML via the event_location[address] array parameter to calendar/submit/.
- Source
- cve@mitre.org
- NVD status
- Analyzed
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 3.5
- Impact score
- 2.9
- Exploitability score
- 6.8
- Vector string
- AV:N/AC:M/Au:S/C:N/I:P/A:N
Weaknesses
- nvd@nist.gov
- CWE-79
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:invisionpower:invision_power_board:4.0.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7DC9976C-50BC-42D5-A29C-F8D9A242FEB4" }, { "criteria": "cpe:2.3:a:invisionpower:invision_power_board:4.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DBDF76B0-0DA8-4A00-B319-8C0AAFE3997A" }, { "criteria": "cpe:2.3:a:invisionpower:invision_power_board:4.0.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EDD7C3F7-FB78-49B2-9569-0994168348F3" }, { "criteria": "cpe:2.3:a:invisionpower:invision_power_board:4.0.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C2F605B7-0840-445A-9D9B-7A31F3BBE015" }, { "criteria": "cpe:2.3:a:invisionpower:invision_power_board:4.0.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1E907E62-8F84-4696-9211-68CFCD33ABCD" }, { "criteria": "cpe:2.3:a:invisionpower:invision_power_board:4.0.5.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C24EECA2-2B2C-4E4F-8D98-A14CEEA55AA5" }, { "criteria": "cpe:2.3:a:invisionpower:invision_power_board:4.0.6.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7655C20B-4483-43D0-956F-7426FDDDAF2A" }, { "criteria": "cpe:2.3:a:invisionpower:invision_power_board:4.0.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6D5A96CB-34D0-46B6-8E1E-F7F17091BCA8" }, { "criteria": "cpe:2.3:a:invisionpower:invision_power_board:4.0.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1B399679-181B-4305-9256-CCF32E93ADE7" }, { "criteria": "cpe:2.3:a:invisionpower:invision_power_board:4.0.8.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EBEC8363-7FF1-4BB2-9BFB-07319391E511" }, { "criteria": "cpe:2.3:a:invisionpower:invision_power_board:4.0.9.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "272661E2-353B-42D9-A649-42C1D8B5159C" }, { "criteria": "cpe:2.3:a:invisionpower:invision_power_board:4.0.10.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1CA019FF-A917-473B-9EB6-349CA512173D" }, { "criteria": "cpe:2.3:a:invisionpower:invision_power_board:4.0.11:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "30483016-BB5F-4101-92AB-B26AA2A65596" }, { "criteria": "cpe:2.3:a:invisionpower:invision_power_board:4.0.12:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A0D11EAA-35B1-4944-9982-087A1EB88710" } ], "operator": "OR" } ] } ]