{"api_version":"1","generated_at":"2026-05-15T20:22:55+00:00","cve":"CVE-2006-7064","urls":{"html":"https://cve.report/CVE-2006-7064","api":"https://cve.report/api/cve/CVE-2006-7064.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2006-7064","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2006-7064"},"summary":{"title":"CVE-2006-7064","description":"Cross-site scripting (XSS) vulnerability in forum/admin.php for Invision Power Board (IPB) 2.1.6 and earlier allows remote attackers to inject arbitrary web script or HTML as the administrator via the phpinfo parameter.","state":"PUBLISHED","assigner":"mitre","published_at":"2007-02-24 01:28:00","updated_at":"2026-04-23 00:35:47"},"problem_types":["NVD-CWE-Other","n/a"],"metrics":[{"version":"2.0","source":"nvd@nist.gov","type":"Primary","score":"9.3","severity":"","vector":"AV:N/AC:M/Au:N/C:C/I:C/A:C","data":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:C/I:C/A:C","baseScore":9.3,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"}}],"references":[{"url":"http://www.securityfocus.com/bid/18450","name":"http://www.securityfocus.com/bid/18450","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Invision Power Board Admin.PHP Cross-site Scripting Vulnerability","mime":"text/html","httpstatus":"200","archivestatus":"0"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/27069","name":"https://exchange.xforce.ibmcloud.com/vulnerabilities/27069","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"IBM X-Force Exchange","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://securityreason.com/securityalert/2307","name":"http://securityreason.com/securityalert/2307","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"CXSecurity - IDS","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://archives.neohapsis.com/archives/bugtraq/2006-06/0204.html","name":"http://archives.neohapsis.com/archives/bugtraq/2006-06/0204.html","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"","mime":"text/html","httpstatus":"-1","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2006-7064","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2006-7064","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"n/a","product":"n/a","version":"affected n/a","platforms":[]}],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2006","cve_id":"7064","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"invision_power_services","cpe5":"invision_power_board","cpe6":"1.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"7064","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"invision_power_services","cpe5":"invision_power_board","cpe6":"1.0.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"7064","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"invision_power_services","cpe5":"invision_power_board","cpe6":"1.0.3","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"7064","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"invision_power_services","cpe5":"invision_power_board","cpe6":"1.1.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"7064","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"invision_power_services","cpe5":"invision_power_board","cpe6":"1.1.2","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"7064","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"invision_power_services","cpe5":"invision_power_board","cpe6":"1.2","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"7064","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"invision_power_services","cpe5":"invision_power_board","cpe6":"1.3","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"7064","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"invision_power_services","cpe5":"invision_power_board","cpe6":"1.3.1_final","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"7064","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"invision_power_services","cpe5":"invision_power_board","cpe6":"1.3_final","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"7064","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"invision_power_services","cpe5":"invision_power_board","cpe6":"2.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"7064","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"invision_power_services","cpe5":"invision_power_board","cpe6":"2.0.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"7064","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"invision_power_services","cpe5":"invision_power_board","cpe6":"2.0.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"7064","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"invision_power_services","cpe5":"invision_power_board","cpe6":"2.0.2","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"7064","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"invision_power_services","cpe5":"invision_power_board","cpe6":"2.0.3","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"7064","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"invision_power_services","cpe5":"invision_power_board","cpe6":"2.0.4","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"7064","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"invision_power_services","cpe5":"invision_power_board","cpe6":"2.0.x","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"7064","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"invision_power_services","cpe5":"invision_power_board","cpe6":"2.0_alpha3","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"7064","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"invision_power_services","cpe5":"invision_power_board","cpe6":"2.0_pdr3","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"7064","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"invision_power_services","cpe5":"invision_power_board","cpe6":"2.0_pf1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"7064","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"invision_power_services","cpe5":"invision_power_board","cpe6":"2.0_pf2","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"7064","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"invision_power_services","cpe5":"invision_power_board","cpe6":"2.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"7064","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"invision_power_services","cpe5":"invision_power_board","cpe6":"2.1.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"7064","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"invision_power_services","cpe5":"invision_power_board","cpe6":"2.1.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"7064","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"invision_power_services","cpe5":"invision_power_board","cpe6":"2.1.2","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"7064","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"invision_power_services","cpe5":"invision_power_board","cpe6":"2.1.3","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"7064","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"invision_power_services","cpe5":"invision_power_board","cpe6":"2.1.4","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"7064","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"invision_power_services","cpe5":"invision_power_board","cpe6":"2.1.5","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"7064","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"invision_power_services","cpe5":"invision_power_board","cpe6":"2.1.5_2006-03-08","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"7064","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"invision_power_services","cpe5":"invision_power_board","cpe6":"2.1.5_2006-04-25","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"7064","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"invision_power_services","cpe5":"invision_power_board","cpe6":"2.1.6","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"7064","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"invision_power_services","cpe5":"invision_power_board","cpe6":"2.1_alpha2","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"7064","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"invision_power_services","cpe5":"invision_power_board","cpe6":"2.1_beta2","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"7064","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"invision_power_services","cpe5":"invision_power_board","cpe6":"2.1_beta3","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"7064","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"invision_power_services","cpe5":"invision_power_board","cpe6":"2.1_beta4","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"7064","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"invision_power_services","cpe5":"invision_power_board","cpe6":"2.1_beta5","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"7064","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"invision_power_services","cpe5":"invision_power_board","cpe6":"2.1_rc1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"adp":[{"providerMetadata":{"dateUpdated":"2024-08-07T20:50:05.948Z","orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE"},"references":[{"name":"20060609 Invision Power Board XSS","tags":["mailing-list","x_refsource_BUGTRAQ","x_transferred"],"url":"http://archives.neohapsis.com/archives/bugtraq/2006-06/0204.html"},{"name":"18450","tags":["vdb-entry","x_refsource_BID","x_transferred"],"url":"http://www.securityfocus.com/bid/18450"},{"name":"2307","tags":["third-party-advisory","x_refsource_SREASON","x_transferred"],"url":"http://securityreason.com/securityalert/2307"},{"name":"ipb-admin-phpinfo-xss(27069)","tags":["vdb-entry","x_refsource_XF","x_transferred"],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/27069"}],"title":"CVE Program Container"}],"cna":{"affected":[{"product":"n/a","vendor":"n/a","versions":[{"status":"affected","version":"n/a"}]}],"datePublic":"2006-06-09T00:00:00.000Z","descriptions":[{"lang":"en","value":"Cross-site scripting (XSS) vulnerability in forum/admin.php for Invision Power Board (IPB) 2.1.6 and earlier allows remote attackers to inject arbitrary web script or HTML as the administrator via the phpinfo parameter."}],"problemTypes":[{"descriptions":[{"description":"n/a","lang":"en","type":"text"}]}],"providerMetadata":{"dateUpdated":"2017-07-28T12:57:01.000Z","orgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","shortName":"mitre"},"references":[{"name":"20060609 Invision Power Board XSS","tags":["mailing-list","x_refsource_BUGTRAQ"],"url":"http://archives.neohapsis.com/archives/bugtraq/2006-06/0204.html"},{"name":"18450","tags":["vdb-entry","x_refsource_BID"],"url":"http://www.securityfocus.com/bid/18450"},{"name":"2307","tags":["third-party-advisory","x_refsource_SREASON"],"url":"http://securityreason.com/securityalert/2307"},{"name":"ipb-admin-phpinfo-xss(27069)","tags":["vdb-entry","x_refsource_XF"],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/27069"}],"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"cve@mitre.org","ID":"CVE-2006-7064","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"Cross-site scripting (XSS) vulnerability in forum/admin.php for Invision Power Board (IPB) 2.1.6 and earlier allows remote attackers to inject arbitrary web script or HTML as the administrator via the phpinfo parameter."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"name":"20060609 Invision Power Board XSS","refsource":"BUGTRAQ","url":"http://archives.neohapsis.com/archives/bugtraq/2006-06/0204.html"},{"name":"18450","refsource":"BID","url":"http://www.securityfocus.com/bid/18450"},{"name":"2307","refsource":"SREASON","url":"http://securityreason.com/securityalert/2307"},{"name":"ipb-admin-phpinfo-xss(27069)","refsource":"XF","url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/27069"}]}}}},"cveMetadata":{"assignerOrgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","assignerShortName":"mitre","cveId":"CVE-2006-7064","datePublished":"2007-02-24T01:00:00.000Z","dateReserved":"2007-02-23T00:00:00.000Z","dateUpdated":"2024-08-07T20:50:05.948Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"},"nvd":{"publishedDate":"2007-02-24 01:28:00","lastModifiedDate":"2026-04-23 00:35:47","problem_types":["NVD-CWE-Other","n/a"],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:C/I:C/A:C","baseScore":9.3,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":8.6,"impactScore":10,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:invision_power_services:invision_power_board:1.0:*:*:*:*:*:*:*","matchCriteriaId":"19CF6BD7-04F2-4D69-8402-EC4B637EA083"},{"vulnerable":true,"criteria":"cpe:2.3:a:invision_power_services:invision_power_board:1.0.1:*:*:*:*:*:*:*","matchCriteriaId":"2F0C566E-2AC5-47A2-9246-2FBC87828690"},{"vulnerable":true,"criteria":"cpe:2.3:a:invision_power_services:invision_power_board:1.0.3:*:*:*:*:*:*:*","matchCriteriaId":"8B83740E-6C38-4BEB-84A2-6B0F01799DCE"},{"vulnerable":true,"criteria":"cpe:2.3:a:invision_power_services:invision_power_board:1.1.1:*:*:*:*:*:*:*","matchCriteriaId":"29692429-A920-4BAD-9D79-D36EBE74EFB5"},{"vulnerable":true,"criteria":"cpe:2.3:a:invision_power_services:invision_power_board:1.1.2:*:*:*:*:*:*:*","matchCriteriaId":"0D52AB16-A202-48B6-82C0-AD13EBCC7FCA"},{"vulnerable":true,"criteria":"cpe:2.3:a:invision_power_services:invision_power_board:1.2:*:*:*:*:*:*:*","matchCriteriaId":"C498DCB3-3CC7-4334-BF61-F5DA43F4B90F"},{"vulnerable":true,"criteria":"cpe:2.3:a:invision_power_services:invision_power_board:1.3:*:*:*:*:*:*:*","matchCriteriaId":"99A7875E-DAF0-46CD-AE30-246EB3FC6BB7"},{"vulnerable":true,"criteria":"cpe:2.3:a:invision_power_services:invision_power_board:1.3.1_final:*:*:*:*:*:*:*","matchCriteriaId":"F2103FBA-1B72-43FC-A1ED-28F8C7DA0EE4"},{"vulnerable":true,"criteria":"cpe:2.3:a:invision_power_services:invision_power_board:1.3_final:*:*:*:*:*:*:*","matchCriteriaId":"94FBF21B-CF52-41BB-BAF1-AF822586D28B"},{"vulnerable":true,"criteria":"cpe:2.3:a:invision_power_services:invision_power_board:2.0:*:*:*:*:*:*:*","matchCriteriaId":"C9AF155D-BDF6-4B5F-89BF-62CDE6FB48DA"},{"vulnerable":true,"criteria":"cpe:2.3:a:invision_power_services:invision_power_board:2.0.0:*:*:*:*:*:*:*","matchCriteriaId":"615FFE8F-1EDA-4CE2-BC6F-E7348DAE37E1"},{"vulnerable":true,"criteria":"cpe:2.3:a:invision_power_services:invision_power_board:2.0.1:*:*:*:*:*:*:*","matchCriteriaId":"19B001F3-8A6E-423D-9382-AA696D193F08"},{"vulnerable":true,"criteria":"cpe:2.3:a:invision_power_services:invision_power_board:2.0.2:*:*:*:*:*:*:*","matchCriteriaId":"2CDDB243-B03B-4DFE-9234-FD886EA80C50"},{"vulnerable":true,"criteria":"cpe:2.3:a:invision_power_services:invision_power_board:2.0.3:*:*:*:*:*:*:*","matchCriteriaId":"7139AE38-8E5D-4D1D-A126-9CD10CE13E2C"},{"vulnerable":true,"criteria":"cpe:2.3:a:invision_power_services:invision_power_board:2.0.4:*:*:*:*:*:*:*","matchCriteriaId":"6E24336F-BD4C-4596-8FFE-9D53AB802BB1"},{"vulnerable":true,"criteria":"cpe:2.3:a:invision_power_services:invision_power_board:2.0.x:*:*:*:*:*:*:*","matchCriteriaId":"AE478AB9-7ED4-4FDD-8990-CC4442CFA416"},{"vulnerable":true,"criteria":"cpe:2.3:a:invision_power_services:invision_power_board:2.0_alpha3:*:*:*:*:*:*:*","matchCriteriaId":"14F5777B-25A8-4D20-AD24-A639E315582F"},{"vulnerable":true,"criteria":"cpe:2.3:a:invision_power_services:invision_power_board:2.0_pdr3:*:*:*:*:*:*:*","matchCriteriaId":"6FF0C787-BDC5-4154-809A-864DA3D4769D"},{"vulnerable":true,"criteria":"cpe:2.3:a:invision_power_services:invision_power_board:2.0_pf1:*:*:*:*:*:*:*","matchCriteriaId":"23A69133-FF5A-457E-823F-64920A0DB9F7"},{"vulnerable":true,"criteria":"cpe:2.3:a:invision_power_services:invision_power_board:2.0_pf2:*:*:*:*:*:*:*","matchCriteriaId":"23C37B74-6486-46A2-AC2C-C27786ED697E"},{"vulnerable":true,"criteria":"cpe:2.3:a:invision_power_services:invision_power_board:2.1:*:*:*:*:*:*:*","matchCriteriaId":"5C63DDA0-9B4C-4D3E-9633-82C330753ABA"},{"vulnerable":true,"criteria":"cpe:2.3:a:invision_power_services:invision_power_board:2.1.0:*:*:*:*:*:*:*","matchCriteriaId":"AB960ACC-74D4-4AFB-886C-11EB5180DFD2"},{"vulnerable":true,"criteria":"cpe:2.3:a:invision_power_services:invision_power_board:2.1.1:*:*:*:*:*:*:*","matchCriteriaId":"B1BA6316-7E7E-4A6B-AA54-1846198D64BC"},{"vulnerable":true,"criteria":"cpe:2.3:a:invision_power_services:invision_power_board:2.1.2:*:*:*:*:*:*:*","matchCriteriaId":"EA70C944-F70E-49F4-AA9C-D19148925C0F"},{"vulnerable":true,"criteria":"cpe:2.3:a:invision_power_services:invision_power_board:2.1.3:*:*:*:*:*:*:*","matchCriteriaId":"6CAF5259-D99A-45A1-8DD4-C6858B302272"},{"vulnerable":true,"criteria":"cpe:2.3:a:invision_power_services:invision_power_board:2.1.4:*:*:*:*:*:*:*","matchCriteriaId":"67ED0140-7137-4F8D-AEA1-53251D4D4273"},{"vulnerable":true,"criteria":"cpe:2.3:a:invision_power_services:invision_power_board:2.1.5:*:*:*:*:*:*:*","matchCriteriaId":"75723F84-9989-4195-9827-E3A6DF2ABA6A"},{"vulnerable":true,"criteria":"cpe:2.3:a:invision_power_services:invision_power_board:2.1.5_2006-03-08:*:*:*:*:*:*:*","matchCriteriaId":"ED5116FA-C532-42DF-ABBD-193AD7B799A6"},{"vulnerable":true,"criteria":"cpe:2.3:a:invision_power_services:invision_power_board:2.1.5_2006-04-25:*:*:*:*:*:*:*","matchCriteriaId":"8A90F21A-0FE7-456C-86FA-2F60542A7EA1"},{"vulnerable":true,"criteria":"cpe:2.3:a:invision_power_services:invision_power_board:2.1.6:*:*:*:*:*:*:*","matchCriteriaId":"E8BC2011-5D19-4AF2-BCCD-38A03D0175FC"},{"vulnerable":true,"criteria":"cpe:2.3:a:invision_power_services:invision_power_board:2.1_alpha2:*:*:*:*:*:*:*","matchCriteriaId":"232885C1-B578-4E6E-8472-FF47A17DF976"},{"vulnerable":true,"criteria":"cpe:2.3:a:invision_power_services:invision_power_board:2.1_beta2:*:*:*:*:*:*:*","matchCriteriaId":"19FFFBC9-F6F0-421C-BD8A-6F2F81C4E62F"},{"vulnerable":true,"criteria":"cpe:2.3:a:invision_power_services:invision_power_board:2.1_beta3:*:*:*:*:*:*:*","matchCriteriaId":"7CB7078D-61D2-4ED9-AC8E-2D4F350F0716"},{"vulnerable":true,"criteria":"cpe:2.3:a:invision_power_services:invision_power_board:2.1_beta4:*:*:*:*:*:*:*","matchCriteriaId":"7EC2800F-3A8C-4B63-B754-D921DFF79496"},{"vulnerable":true,"criteria":"cpe:2.3:a:invision_power_services:invision_power_board:2.1_beta5:*:*:*:*:*:*:*","matchCriteriaId":"C5C8BA41-7876-4738-A68A-2162E28A3AB2"},{"vulnerable":true,"criteria":"cpe:2.3:a:invision_power_services:invision_power_board:2.1_rc1:*:*:*:*:*:*:*","matchCriteriaId":"18BF761A-6459-42B0-BCB8-F735FBDD6139"}]}]}]},"legacy_mitre":{"record":{"CveYear":"2006","CveId":"7064","Ordinal":"1","Title":"CVE-2006-7064","CVE":"CVE-2006-7064","Year":"2006"},"notes":[{"CveYear":"2006","CveId":"7064","Ordinal":"1","NoteData":"Cross-site scripting (XSS) vulnerability in forum/admin.php for Invision Power Board (IPB) 2.1.6 and earlier allows remote attackers to inject arbitrary web script or HTML as the administrator via the phpinfo parameter.","Type":"Description","Title":"CVE-2006-7064"},{"CveYear":"2006","CveId":"7064","Ordinal":"2","NoteData":"2007-02-23","Type":"Other","Title":"Published"},{"CveYear":"2006","CveId":"7064","Ordinal":"3","NoteData":"2017-07-28","Type":"Other","Title":"Modified"}]}}}