{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-21T13:52:51.844","vulnerabilities":[{"cve":{"id":"CVE-2006-3197","sourceIdentifier":"cve@mitre.org","published":"2006-06-23T00:02:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Cross-site scripting (XSS) vulnerability in Invision Power Board (IPB) 2.1.6 and earlier allows remote attackers to inject arbitrary web script or HTML via a POST that contains hexadecimal-encoded HTML."},{"lang":"es","value":"Vulnerabilidad de ejecución de secuencias de comandos en sitios cruzados (XSS) en Invision Power Board (IPB) v2.1.6 y anteriores, permite a atacantes remotos inyectar secuencias de comandos web o HTML a través de una petición POST que contenga código HTML codificado en hexadecimal."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:N/I:P/A:N","baseScore":4.3,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":8.6,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:invision_power_services:invision_power_board:2.1:*:*:*:*:*:*:*","matchCriteriaId":"5C63DDA0-9B4C-4D3E-9633-82C330753ABA"},{"vulnerable":true,"criteria":"cpe:2.3:a:invision_power_services:invision_power_board:2.1.0:*:*:*:*:*:*:*","matchCriteriaId":"AB960ACC-74D4-4AFB-886C-11EB5180DFD2"},{"vulnerable":true,"criteria":"cpe:2.3:a:invision_power_services:invision_power_board:2.1.1:*:*:*:*:*:*:*","matchCriteriaId":"B1BA6316-7E7E-4A6B-AA54-1846198D64BC"},{"vulnerable":true,"criteria":"cpe:2.3:a:invision_power_services:invision_power_board:2.1.2:*:*:*:*:*:*:*","matchCriteriaId":"EA70C944-F70E-49F4-AA9C-D19148925C0F"},{"vulnerable":true,"criteria":"cpe:2.3:a:invision_power_services:invision_power_board:2.1.3:*:*:*:*:*:*:*","matchCriteriaId":"6CAF5259-D99A-45A1-8DD4-C6858B302272"},{"vulnerable":true,"criteria":"cpe:2.3:a:invision_power_services:invision_power_board:2.1.4:*:*:*:*:*:*:*","matchCriteriaId":"67ED0140-7137-4F8D-AEA1-53251D4D4273"},{"vulnerable":true,"criteria":"cpe:2.3:a:invision_power_services:invision_power_board:2.1.5:*:*:*:*:*:*:*","matchCriteriaId":"75723F84-9989-4195-9827-E3A6DF2ABA6A"},{"vulnerable":true,"criteria":"cpe:2.3:a:invision_power_services:invision_power_board:2.1.6:*:*:*:*:*:*:*","matchCriteriaId":"E8BC2011-5D19-4AF2-BCCD-38A03D0175FC"},{"vulnerable":true,"criteria":"cpe:2.3:a:invision_power_services:invision_power_board:2.1_alpha2:*:*:*:*:*:*:*","matchCriteriaId":"232885C1-B578-4E6E-8472-FF47A17DF976"},{"vulnerable":true,"criteria":"cpe:2.3:a:invision_power_services:invision_power_board:2.1_beta2:*:*:*:*:*:*:*","matchCriteriaId":"19FFFBC9-F6F0-421C-BD8A-6F2F81C4E62F"},{"vulnerable":true,"criteria":"cpe:2.3:a:invision_power_services:invision_power_board:2.1_beta3:*:*:*:*:*:*:*","matchCriteriaId":"7CB7078D-61D2-4ED9-AC8E-2D4F350F0716"},{"vulnerable":true,"criteria":"cpe:2.3:a:invision_power_services:invision_power_board:2.1_beta4:*:*:*:*:*:*:*","matchCriteriaId":"7EC2800F-3A8C-4B63-B754-D921DFF79496"},{"vulnerable":true,"criteria":"cpe:2.3:a:invision_power_services:invision_power_board:2.1_beta5:*:*:*:*:*:*:*","matchCriteriaId":"C5C8BA41-7876-4738-A68A-2162E28A3AB2"},{"vulnerable":true,"criteria":"cpe:2.3:a:invision_power_services:invision_power_board:2.1_rc1:*:*:*:*:*:*:*","matchCriteriaId":"18BF761A-6459-42B0-BCB8-F735FBDD6139"}]}]}],"references":[{"url":"http://forums.invisionpower.com/index.php?showtopic=219126","source":"cve@mitre.org","tags":["Patch"]},{"url":"http://secunia.com/advisories/20772","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://securityreason.com/securityalert/596","source":"cve@mitre.org"},{"url":"http://www.osvdb.org/26747","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/18571","source":"cve@mitre.org"},{"url":"http://www.vupen.com/english/advisories/2006/2481","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/27701","source":"cve@mitre.org"},{"url":"http://forums.invisionpower.com/index.php?showtopic=219126","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"]},{"url":"http://secunia.com/advisories/20772","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"http://securityreason.com/securityalert/596","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.osvdb.org/26747","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/18571","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.vupen.com/english/advisories/2006/2481","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/27701","source":"af854a3a-2127-422b-91ae-364da2661108"}]}}]}