The remote host is vulnerable to multiple attack vectors.
The remote host is running Invision Board, a CGI suite designed to set up a bulletin board system on the remote web server. This version of Invision Board is vulnerable to several SQL injection attacks due to a lack of parsing on the 'act' and 'name' variables of the index.php script. There is an information disclosure flaw where authentication materials can be retrieved from 'ipb_stronghold' cookies. There is a vulnerability that allows attackers to hijack administrative sessions. There is a denial of service vulnerability due to a lack of parsing to the 'clean_globals()' function. There is a flaw in the 'source/action_admin/languages.php' where an attacker can inject code that is later executed via an 'eval()' function. Finally, there is a flaw in the way that the application handles data sent to the 'INFO[base_url]' parameter of the 'admin.php' script. A remote attacker can invoke arbitrary PHP script code.
Upgrade or patch according to vendor recommendations.