Search criteria

3 vulnerabilities found for ip.nexus by invisionpower

FKIE_CVE-2014-3149

Vulnerability from fkie_nvd - Published: 2014-07-03 14:55 - Updated: 2025-04-12 10:46
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in Invision Power IP.Board (aka IPB or Power Board) 3.3.x and 3.4.x through 3.4.6, as downloaded before 20140424, or IP.Nexus 1.5.x through 1.5.9, as downloaded before 20140424, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:invisioncommunity:invision_power_board:3.3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "99FFCEE5-2A51-4D4A-A04E-74DA1A9EA7B2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:invisioncommunity:invision_power_board:3.3.0:alpha1:*:*:*:*:*:*",
              "matchCriteriaId": "784BFFC7-C237-47ED-AAE2-E6380427473A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:invisioncommunity:invision_power_board:3.3.0:alpha2:*:*:*:*:*:*",
              "matchCriteriaId": "1F58948C-552A-404B-94FE-D80869593E2E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:invisioncommunity:invision_power_board:3.3.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "6008A365-6856-4A7D-AD7C-8614B5BEEE18",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:invisioncommunity:invision_power_board:3.3.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "C4F1DDBB-5896-4026-8EBF-4934F13576D8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:invisioncommunity:invision_power_board:3.3.0:beta3:*:*:*:*:*:*",
              "matchCriteriaId": "AEE3DB7A-530E-48D9-BA57-BFB524A203F6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:invisioncommunity:invision_power_board:3.3.0:beta4:*:*:*:*:*:*",
              "matchCriteriaId": "6BDB1057-2279-4CC3-8CFB-69B10F772440",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:invisioncommunity:invision_power_board:3.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "5AE613CF-1CEA-4B3E-9906-DD3B8C7CBCF4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:invisioncommunity:invision_power_board:3.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7D0EFE0-6468-4EBB-9AF6-A84B57531ED5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:invisioncommunity:invision_power_board:3.3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "96CAB4DC-6817-4BB8-8665-B06861D67B4F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:invisioncommunity:invision_power_board:3.3.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "15F22F32-1FDB-469D-9478-49EBBDCB97B5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:invisioncommunity:invision_power_board:3.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A777CF4-9BCE-49D4-9248-6BAA1966B1DF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:invisioncommunity:invision_power_board:3.4.0:alpha1:*:*:*:*:*:*",
              "matchCriteriaId": "55C99849-81C5-45A5-B3B8-0BFF62BF19C1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:invisioncommunity:invision_power_board:3.4.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "83C25B54-AE40-4E6C-8969-6EFAD0C75604",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:invisioncommunity:invision_power_board:3.4.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "E81E98C8-E959-4E48-8BC1-118EF2CE7AB8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:invisioncommunity:invision_power_board:3.4.0:beta3:*:*:*:*:*:*",
              "matchCriteriaId": "AD21C54B-0118-4CD6-B0BF-5CBB31BC4BED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:invisioncommunity:invision_power_board:3.4.0:beta4:*:*:*:*:*:*",
              "matchCriteriaId": "2DBFC487-CADD-4410-8817-FD58DED0E5E9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:invisioncommunity:invision_power_board:3.4.0:beta5:*:*:*:*:*:*",
              "matchCriteriaId": "FBA34B41-7997-4A52-8D78-E0BFD798C4BA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:invisioncommunity:invision_power_board:3.4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "73D08920-9F21-442A-BCE3-282EB724ED16",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:invisioncommunity:invision_power_board:3.4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C8719C2-4F1C-43A2-9476-AABE1E30E32C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:invisioncommunity:invision_power_board:3.4.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "9743ACA1-6623-4A88-85E1-BBB51906D1FA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:invisioncommunity:invision_power_board:3.4.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "45415FB5-9CC7-4144-ACEE-E5DFB13AC6DA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:invisioncommunity:invision_power_board:3.4.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "571CA374-11A2-44A9-B007-3F3D4247884A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:invisioncommunity:invision_power_board:3.4.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "D52D8713-B5BA-43C2-BC46-02A2CD3950CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:invisionpower:ip.nexus:1.5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE3309A2-7A86-4329-AAEC-B4DF3F07D8A6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:invisionpower:ip.nexus:1.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "66328372-F96F-4D2F-9C40-2F496CB7FF43",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:invisionpower:ip.nexus:1.5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "BCC3D41B-97DB-49CD-AB03-70E57E315EF2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:invisionpower:ip.nexus:1.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "1433CDF0-81F0-4F19-A690-3F8CAF9218A3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:invisionpower:ip.nexus:1.5.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "37E30710-C68D-48A7-AEC6-B90C3F827FA0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:invisionpower:ip.nexus:1.5.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "BB5DFDCA-5F55-4DF8-973D-812A6F2A56E1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:invisionpower:ip.nexus:1.5.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1288A3F-BC57-405A-A1E9-1C7496C659C3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:invisionpower:ip.nexus:1.5.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "1DD12849-5960-4614-9ABC-37E63EE0CD64",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:invisionpower:ip.nexus:1.5.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "41F73B12-249D-46B7-82B4-BD9B30C772FF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:invisionpower:ip.nexus:1.5.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "C7A3D453-8B96-483B-AE42-D885A3792FB7",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Cross-site scripting (XSS) vulnerability in Invision Power IP.Board (aka IPB or Power Board) 3.3.x and 3.4.x through 3.4.6, as downloaded before 20140424, or IP.Nexus 1.5.x through 1.5.9, as downloaded before 20140424, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad de XSS en Invision Power IP.Board (tambi\u00e9n conocido como IPB o Power Board) 3.3.x y 3.4.x hasta 3.4.6, descargado antes del 20140424, o IP.Nexus 1.5.x hasta 1.5.9, descargado antes del 20140424, permite a atacantes remotos inyectar secuencias de comandos web o HTML arbitrarios a trav\u00e9s de vectores no especificados."
    }
  ],
  "id": "CVE-2014-3149",
  "lastModified": "2025-04-12T10:46:40.837",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2014-07-03T14:55:07.020",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://community.invisionpower.com/topic/399747-ipboard-33x-34x-security-update"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://packetstormsecurity.com/files/127328/IP.Board-3.4.x-3.3.x-Cross-Site-Scripting.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.christian-schneider.net/advisories/CVE-2014-3149.txt"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/532618/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/67164"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://community.invisionpower.com/topic/399747-ipboard-33x-34x-security-update"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://packetstormsecurity.com/files/127328/IP.Board-3.4.x-3.3.x-Cross-Site-Scripting.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.christian-schneider.net/advisories/CVE-2014-3149.txt"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/532618/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/67164"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

CVE-2014-3149 (GCVE-0-2014-3149)

Vulnerability from cvelistv5 – Published: 2014-07-03 14:00 – Updated: 2024-08-06 10:35
VLAI?
Summary
Cross-site scripting (XSS) vulnerability in Invision Power IP.Board (aka IPB or Power Board) 3.3.x and 3.4.x through 3.4.6, as downloaded before 20140424, or IP.Nexus 1.5.x through 1.5.9, as downloaded before 20140424, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T10:35:56.500Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20140701 CVE-2014-3149 - Reflected Cross-Site Scripting (XSS) in \"Invision Power IP.Board\"",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/532618/100/0/threaded"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.christian-schneider.net/advisories/CVE-2014-3149.txt"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://packetstormsecurity.com/files/127328/IP.Board-3.4.x-3.3.x-Cross-Site-Scripting.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://community.invisionpower.com/topic/399747-ipboard-33x-34x-security-update"
          },
          {
            "name": "67164",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/67164"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2014-04-24T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Cross-site scripting (XSS) vulnerability in Invision Power IP.Board (aka IPB or Power Board) 3.3.x and 3.4.x through 3.4.6, as downloaded before 20140424, or IP.Nexus 1.5.x through 1.5.9, as downloaded before 20140424, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-09T18:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "20140701 CVE-2014-3149 - Reflected Cross-Site Scripting (XSS) in \"Invision Power IP.Board\"",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/532618/100/0/threaded"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.christian-schneider.net/advisories/CVE-2014-3149.txt"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://packetstormsecurity.com/files/127328/IP.Board-3.4.x-3.3.x-Cross-Site-Scripting.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://community.invisionpower.com/topic/399747-ipboard-33x-34x-security-update"
        },
        {
          "name": "67164",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/67164"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2014-3149",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Cross-site scripting (XSS) vulnerability in Invision Power IP.Board (aka IPB or Power Board) 3.3.x and 3.4.x through 3.4.6, as downloaded before 20140424, or IP.Nexus 1.5.x through 1.5.9, as downloaded before 20140424, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20140701 CVE-2014-3149 - Reflected Cross-Site Scripting (XSS) in \"Invision Power IP.Board\"",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/532618/100/0/threaded"
            },
            {
              "name": "http://www.christian-schneider.net/advisories/CVE-2014-3149.txt",
              "refsource": "MISC",
              "url": "http://www.christian-schneider.net/advisories/CVE-2014-3149.txt"
            },
            {
              "name": "http://packetstormsecurity.com/files/127328/IP.Board-3.4.x-3.3.x-Cross-Site-Scripting.html",
              "refsource": "MISC",
              "url": "http://packetstormsecurity.com/files/127328/IP.Board-3.4.x-3.3.x-Cross-Site-Scripting.html"
            },
            {
              "name": "http://community.invisionpower.com/topic/399747-ipboard-33x-34x-security-update",
              "refsource": "CONFIRM",
              "url": "http://community.invisionpower.com/topic/399747-ipboard-33x-34x-security-update"
            },
            {
              "name": "67164",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/67164"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2014-3149",
    "datePublished": "2014-07-03T14:00:00",
    "dateReserved": "2014-05-02T00:00:00",
    "dateUpdated": "2024-08-06T10:35:56.500Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2014-3149 (GCVE-0-2014-3149)

Vulnerability from nvd – Published: 2014-07-03 14:00 – Updated: 2024-08-06 10:35
VLAI?
Summary
Cross-site scripting (XSS) vulnerability in Invision Power IP.Board (aka IPB or Power Board) 3.3.x and 3.4.x through 3.4.6, as downloaded before 20140424, or IP.Nexus 1.5.x through 1.5.9, as downloaded before 20140424, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T10:35:56.500Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20140701 CVE-2014-3149 - Reflected Cross-Site Scripting (XSS) in \"Invision Power IP.Board\"",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/532618/100/0/threaded"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.christian-schneider.net/advisories/CVE-2014-3149.txt"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://packetstormsecurity.com/files/127328/IP.Board-3.4.x-3.3.x-Cross-Site-Scripting.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://community.invisionpower.com/topic/399747-ipboard-33x-34x-security-update"
          },
          {
            "name": "67164",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/67164"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2014-04-24T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Cross-site scripting (XSS) vulnerability in Invision Power IP.Board (aka IPB or Power Board) 3.3.x and 3.4.x through 3.4.6, as downloaded before 20140424, or IP.Nexus 1.5.x through 1.5.9, as downloaded before 20140424, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-09T18:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "20140701 CVE-2014-3149 - Reflected Cross-Site Scripting (XSS) in \"Invision Power IP.Board\"",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/532618/100/0/threaded"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.christian-schneider.net/advisories/CVE-2014-3149.txt"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://packetstormsecurity.com/files/127328/IP.Board-3.4.x-3.3.x-Cross-Site-Scripting.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://community.invisionpower.com/topic/399747-ipboard-33x-34x-security-update"
        },
        {
          "name": "67164",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/67164"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2014-3149",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Cross-site scripting (XSS) vulnerability in Invision Power IP.Board (aka IPB or Power Board) 3.3.x and 3.4.x through 3.4.6, as downloaded before 20140424, or IP.Nexus 1.5.x through 1.5.9, as downloaded before 20140424, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20140701 CVE-2014-3149 - Reflected Cross-Site Scripting (XSS) in \"Invision Power IP.Board\"",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/532618/100/0/threaded"
            },
            {
              "name": "http://www.christian-schneider.net/advisories/CVE-2014-3149.txt",
              "refsource": "MISC",
              "url": "http://www.christian-schneider.net/advisories/CVE-2014-3149.txt"
            },
            {
              "name": "http://packetstormsecurity.com/files/127328/IP.Board-3.4.x-3.3.x-Cross-Site-Scripting.html",
              "refsource": "MISC",
              "url": "http://packetstormsecurity.com/files/127328/IP.Board-3.4.x-3.3.x-Cross-Site-Scripting.html"
            },
            {
              "name": "http://community.invisionpower.com/topic/399747-ipboard-33x-34x-security-update",
              "refsource": "CONFIRM",
              "url": "http://community.invisionpower.com/topic/399747-ipboard-33x-34x-security-update"
            },
            {
              "name": "67164",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/67164"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2014-3149",
    "datePublished": "2014-07-03T14:00:00",
    "dateReserved": "2014-05-02T00:00:00",
    "dateUpdated": "2024-08-06T10:35:56.500Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}