source: https://www.securityfocus.com/bid/9768/info
Invision Power Board is prone to multiple cross-site scripting vulnerabilities.
These issues are due to insufficient sanitization of input supplied via the 'c', 'f', , 'showuser', and 'username' URI parameters. This input will be included in dynamically generated pages, making it possible for an attacker to create a malicious link to a vulnerable site that includes hostile HTML and script code. This code may be rendered in the browser of a victim user who visits the malicious link, potentially allowing for theft of cookie-based credentials or other attacks.
These issues are reported to affect Invision Power Board 1.3 Final. Earlier versions may also be affected.
http://www.example.com/?c='>
http://www.example.com/?act=SR&f='>
http://www.example.com/?showuser='>
http://www.example.com/index.php?act=Reg&CODE=2&coppa_user=0&UserName='>