Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:ubercart:ubercart:7.x-3.0:*:*:*:*:*:*:*", "matchCriteriaId": "04BC3A61-E7DB-4DBC-94CC-9044924565D6", "vulnerable": true}, {"criteria": "cpe:2.3:a:ubercart:ubercart:7.x-3.0:alpha1:*:*:*:*:*:*", "matchCriteriaId": "A6D24014-F825-48EF-B6F3-5833FE2A0B1D", "vulnerable": true}, {"criteria": "cpe:2.3:a:ubercart:ubercart:7.x-3.0:alpha2:*:*:*:*:*:*", "matchCriteriaId": "151306C9-2F74-40D2-91B4-83F1462C9C3A", "vulnerable": true}, {"criteria": "cpe:2.3:a:ubercart:ubercart:7.x-3.0:alpha3:*:*:*:*:*:*", "matchCriteriaId": "876E0000-FB61-4772-B276-69EA82EBA6A3", "vulnerable": true}, {"criteria": "cpe:2.3:a:ubercart:ubercart:7.x-3.0:beta1:*:*:*:*:*:*", "matchCriteriaId": "74015B5D-E453-4929-AFE5-F796B3372996", "vulnerable": true}, {"criteria": "cpe:2.3:a:ubercart:ubercart:7.x-3.0:beta2:*:*:*:*:*:*", "matchCriteriaId": "74B174EB-05D1-49A0-932E-108D48A86123", "vulnerable": true}, {"criteria": "cpe:2.3:a:ubercart:ubercart:7.x-3.0:beta3:*:*:*:*:*:*", "matchCriteriaId": "7A3863C1-4C78-4E73-B7CF-B652BE6B6CCD", "vulnerable": true}, {"criteria": "cpe:2.3:a:ubercart:ubercart:7.x-3.0:beta4:*:*:*:*:*:*", "matchCriteriaId": "CBE8363A-30FB-412D-8EB0-B11EBE44746B", "vulnerable": true}, {"criteria": "cpe:2.3:a:ubercart:ubercart:7.x-3.0:dev:*:*:*:*:*:*", "matchCriteriaId": "32A8EFC1-A98A-400F-B500-A56DB9EEFC0E", "vulnerable": true}, {"criteria": "cpe:2.3:a:ubercart:ubercart:7.x-3.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "6AED1B86-A20F-4C7E-A920-31553A4716EB", "vulnerable": true}, {"criteria": "cpe:2.3:a:ubercart:ubercart:7.x-3.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "67F969B8-9FD7-4A58-826B-626598B4AE9B", "vulnerable": true}, {"criteria": "cpe:2.3:a:ubercart:ubercart:7.x-3.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "85E02C58-8311-4441-B55C-2E5A41A63993", "vulnerable": true}, {"criteria": "cpe:2.3:a:ubercart:ubercart:7.x-3.0:rc4:*:*:*:*:*:*", "matchCriteriaId": "326F858F-B04E-44B2-B7F8-A011A8856AF4", "vulnerable": true}, {"criteria": "cpe:2.3:a:ubercart:ubercart:7.x-3.1:*:*:*:*:*:*:*", "matchCriteriaId": "A86D61B8-A2BF-45C5-9CBB-DEF7A612E3B3", "vulnerable": true}, {"criteria": "cpe:2.3:a:ubercart:ubercart:7.x-3.2:*:*:*:*:*:*:*", "matchCriteriaId": "A290F817-BAB5-466B-8131-6D3532BD5723", "vulnerable": true}, {"criteria": "cpe:2.3:a:ubercart:ubercart:7.x-3.3:*:*:*:*:*:*:*", "matchCriteriaId": "8DE42D13-5230-4DCE-8483-6AEF849E54D0", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:a:drupal:drupal:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8B1170D-AD33-4C7A-892D-63AC71B032CF", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}], "cveTags": [], "descriptions": [{"lang": "en", "value": "Cross-site scripting (XSS) vulnerability in Views in the Ubercart module 7.x-3.x before 7.x-3.4 for Drupal allows remote attackers to inject arbitrary web script or HTML via the full name field."}, {"lang": "es", "value": "Ejecuci\u00f3n de secuencias de comandos en sitios cruzados(XSS) en Views en el m\u00f3dulo Ubercart v7.x-3.x antes v7.x-3.4 para Drupal que permite a atacantes remotos inyectar web script o HTML a trav\u00e9s del campo Nombre completo."}], "id": "CVE-2013-0322", "lastModified": "2025-04-11T00:51:21.963", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": {"accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0"}, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true}]}, "published": "2013-03-27T21:55:02.300", "references": [{"source": "secalert@redhat.com", "tags": ["Patch"], "url": "http://drupal.org/node/1922136"}, {"source": "secalert@redhat.com", "tags": ["Patch", "Vendor Advisory"], "url": "http://drupal.org/node/1922418"}, {"source": "secalert@redhat.com", "url": "http://drupalcode.org/project/ubercart.git/commitdiff/f9d69b5"}, {"source": "secalert@redhat.com", "url": "http://secunia.com/advisories/52298"}, {"source": "secalert@redhat.com", "url": "http://www.openwall.com/lists/oss-security/2013/02/21/5"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch"], "url": "http://drupal.org/node/1922136"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch", "Vendor Advisory"], "url": "http://drupal.org/node/1922418"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://drupalcode.org/project/ubercart.git/commitdiff/f9d69b5"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/52298"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2013/02/21/5"}], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Deferred", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-79"}], "source": "nvd@nist.gov", "type": "Primary"}]}