Show plain JSON{"cve": {"data_type": "CVE", "references": {"reference_data": [{"url": "http://benji.redkod.org/audits/ipb.2.1.pdf", "name": "http://benji.redkod.org/audits/ipb.2.1.pdf", "tags": [], "refsource": "MISC"}, {"url": "http://secunia.com/advisories/17443", "name": "17443", "tags": ["Patch", "Vendor Advisory"], "refsource": "SECUNIA"}, {"url": "http://www.securityfocus.com/bid/15344", "name": "15344", "tags": [], "refsource": "BID"}, {"url": "http://www.securityfocus.com/bid/15345", "name": "15345", "tags": [], "refsource": "BID"}, {"url": "http://osvdb.org/20516", "name": "20516", "tags": [], "refsource": "OSVDB"}, {"url": "http://osvdb.org/20517", "name": "20517", "tags": [], "refsource": "OSVDB"}, {"url": "http://osvdb.org/20518", "name": "20518", "tags": [], "refsource": "OSVDB"}, {"url": "http://osvdb.org/20519", "name": "20519", "tags": [], "refsource": "OSVDB"}, {"url": "http://osvdb.org/20520", "name": "20520", "tags": [], "refsource": "OSVDB"}, {"url": "http://osvdb.org/20521", "name": "20521", "tags": [], "refsource": "OSVDB"}, {"url": "http://osvdb.org/20522", "name": "20522", "tags": [], "refsource": "OSVDB"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/22999", "name": "invision-powerboard-admin-xss(22999)", "tags": [], "refsource": "XF"}, {"url": "http://www.securityfocus.com/archive/1/415801/30/0/threaded", "name": "20051104 Failles dans Invision Power Board 2.1 [xss]", "tags": [], "refsource": "BUGTRAQ"}]}, "data_format": "MITRE", "description": {"description_data": [{"lang": "en", "value": "Cross-site scripting (XSS) vulnerability in Invision Power Board 2.1 allows remote attackers to inject arbitrary web script or HTML via the (1) adsess, (2) name, and (3) description parameters in admin.php, and the (4) ACP Notes, (5) Member Name, (6) Password, (7) Email Address, (8) Components, and multiple other input fields."}]}, "problemtype": {"problemtype_data": [{"description": [{"lang": "en", "value": "NVD-CWE-Other"}]}]}, "data_version": "4.0", "CVE_data_meta": {"ID": "CVE-2005-3547", "ASSIGNER": "cve@mitre.org"}}, "impact": {"baseMetricV2": {"cvssV2": {"version": "2.0", "baseScore": 4.3, "accessVector": "NETWORK", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "authentication": "NONE", "integrityImpact": "PARTIAL", "accessComplexity": "MEDIUM", "availabilityImpact": "NONE", "confidentialityImpact": "NONE"}, "severity": "MEDIUM", "impactScore": 2.9, "obtainAllPrivilege": false, "exploitabilityScore": 8.6, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}}, "publishedDate": "2005-11-16T07:42Z", "configurations": {"nodes": [{"children": [], "operator": "OR", "cpe_match": [{"cpe23Uri": "cpe:2.3:a:invision_power_services:invision_board:2.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}]}], "CVE_data_version": "4.0"}, "lastModifiedDate": "2018-10-19T15:37Z"}