{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-17T13:24:44.227","vulnerabilities":[{"cve":{"id":"CVE-2012-2235","sourceIdentifier":"cve@mitre.org","published":"2012-05-27T19:55:01.140","lastModified":"2025-04-11T00:51:21.963","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"Cross-site scripting (XSS) vulnerability in Support Incident Tracker (SiT!) 3.65 and earlier allows remote attackers to inject arbitrary web script or HTML via the id parameter to index.php, which is not properly handled in an error message."},{"lang":"es","value":"Vulnerabilidad de ejecución de comandos en sitios cruzados (XSS) en Support Incident Tracker (SiT!) v3.65 y anteriores permite a atacantes remotos inyectar secuencias de comandos web o HTML a través del parámetro id de index.php, que no se maneja adecuadamente, en un mensaje de error."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:N/I:P/A:N","baseScore":4.3,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":8.6,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-79"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:sitracker:support_incident_tracker:*:*:*:*:*:*:*:*","versionEndIncluding":"3.65","matchCriteriaId":"3D637BA4-17F7-45A1-9173-1D7A05E5C619"},{"vulnerable":true,"criteria":"cpe:2.3:a:sitracker:support_incident_tracker:1.8.00:*:*:*:*:*:*:*","matchCriteriaId":"50D641D2-158D-4570-B2E4-FFCF63A942DF"},{"vulnerable":true,"criteria":"cpe:2.3:a:sitracker:support_incident_tracker:2.8.00:*:*:*:*:*:*:*","matchCriteriaId":"CD0D1949-AB42-462D-A348-F9CDCDCFF9C2"},{"vulnerable":true,"criteria":"cpe:2.3:a:sitracker:support_incident_tracker:3.00:*:*:*:*:*:*:*","matchCriteriaId":"7CA68017-3E7C-4393-86F6-8E42EB0F3549"},{"vulnerable":true,"criteria":"cpe:2.3:a:sitracker:support_incident_tracker:3.00:beta1:*:*:*:*:*:*","matchCriteriaId":"F04128DD-1BBB-47B0-8CAC-8DBDFE647046"},{"vulnerable":true,"criteria":"cpe:2.3:a:sitracker:support_incident_tracker:3.00:beta2:*:*:*:*:*:*","matchCriteriaId":"6F228481-19D5-4E98-933F-5D1C5CC20008"},{"vulnerable":true,"criteria":"cpe:2.3:a:sitracker:support_incident_tracker:3.00:beta3:*:*:*:*:*:*","matchCriteriaId":"7A085965-4106-40BB-9374-374986E88AB0"},{"vulnerable":true,"criteria":"cpe:2.3:a:sitracker:support_incident_tracker:3.01:*:*:*:*:*:*:*","matchCriteriaId":"5EA97C93-F0DA-43DA-8BA2-706A1E541D97"},{"vulnerable":true,"criteria":"cpe:2.3:a:sitracker:support_incident_tracker:3.02:*:*:*:*:*:*:*","matchCriteriaId":"194634B9-5EBF-4365-ADFB-BD56D6DBA827"},{"vulnerable":true,"criteria":"cpe:2.3:a:sitracker:support_incident_tracker:3.03:*:*:*:*:*:*:*","matchCriteriaId":"93CE290D-A031-40BB-AB85-9911C0F438FA"},{"vulnerable":true,"criteria":"cpe:2.3:a:sitracker:support_incident_tracker:3.03a:*:*:*:*:*:*:*","matchCriteriaId":"4E2CF1C2-DBCE-416A-9C0F-DC19BF7161F1"},{"vulnerable":true,"criteria":"cpe:2.3:a:sitracker:support_incident_tracker:3.04a:*:*:*:*:*:*:*","matchCriteriaId":"E08CC85C-7D41-493D-BC81-A898EDE83B54"},{"vulnerable":true,"criteria":"cpe:2.3:a:sitracker:support_incident_tracker:3.05:*:*:*:*:*:*:*","matchCriteriaId":"8A0AD14E-31D8-4DA2-94D2-D7C3BFCE3396"},{"vulnerable":true,"criteria":"cpe:2.3:a:sitracker:support_incident_tracker:3.6:*:*:*:*:*:*:*","matchCriteriaId":"48854537-091C-4350-A42E-8E6AA19A4C55"},{"vulnerable":true,"criteria":"cpe:2.3:a:sitracker:support_incident_tracker:3.06:*:*:*:*:*:*:*","matchCriteriaId":"2273ED90-763F-45BD-81B2-E20B5A011DEE"},{"vulnerable":true,"criteria":"cpe:2.3:a:sitracker:support_incident_tracker:3.07:*:*:*:*:*:*:*","matchCriteriaId":"A4807E76-3324-480C-BF17-85B5C94ED70B"},{"vulnerable":true,"criteria":"cpe:2.3:a:sitracker:support_incident_tracker:3.45:*:*:*:*:*:*:*","matchCriteriaId":"65028034-D504-49CF-A62B-827A7F86733E"},{"vulnerable":true,"criteria":"cpe:2.3:a:sitracker:support_incident_tracker:3.45:beta1:*:*:*:*:*:*","matchCriteriaId":"9E4CD2D0-66BF-4E95-B3AE-7598902B2C72"},{"vulnerable":true,"criteria":"cpe:2.3:a:sitracker:support_incident_tracker:3.50:*:*:*:*:*:*:*","matchCriteriaId":"2163711F-8830-471A-A9AE-C4B90DB1BC4C"},{"vulnerable":true,"criteria":"cpe:2.3:a:sitracker:support_incident_tracker:3.50:beta1:*:*:*:*:*:*","matchCriteriaId":"CF3D5C9C-05DE-44A1-AEC2-308E87D2E0CD"},{"vulnerable":true,"criteria":"cpe:2.3:a:sitracker:support_incident_tracker:3.51:*:*:*:*:*:*:*","matchCriteriaId":"7929BFDD-9FA8-422B-945D-6FEC46B89E69"},{"vulnerable":true,"criteria":"cpe:2.3:a:sitracker:support_incident_tracker:3.60:*:*:*:*:*:*:*","matchCriteriaId":"5567EF75-2161-4A74-AADE-109B3F0DFD26"},{"vulnerable":true,"criteria":"cpe:2.3:a:sitracker:support_incident_tracker:3.61:*:*:*:*:*:*:*","matchCriteriaId":"228B6318-F28A-4CB7-A054-5CB1E1C75048"},{"vulnerable":true,"criteria":"cpe:2.3:a:sitracker:support_incident_tracker:3.62:*:*:*:*:*:*:*","matchCriteriaId":"68D7980E-CA09-4A29-9901-47FE92A892E0"},{"vulnerable":true,"criteria":"cpe:2.3:a:sitracker:support_incident_tracker:3.63:*:*:*:*:*:*:*","matchCriteriaId":"59E43ED2-A943-4D8C-AAD2-189647073814"},{"vulnerable":true,"criteria":"cpe:2.3:a:sitracker:support_incident_tracker:3.63:beta1:*:*:*:*:*:*","matchCriteriaId":"F2C5C37A-8952-47E9-A081-A0EBDC7E7AF6"},{"vulnerable":true,"criteria":"cpe:2.3:a:sitracker:support_incident_tracker:3.64:*:*:*:*:*:*:*","matchCriteriaId":"C04580AF-8B83-4F0C-BD04-DCCA1BAB8F1F"},{"vulnerable":true,"criteria":"cpe:2.3:a:sitracker:support_incident_tracker:4.8.00:*:*:*:*:*:*:*","matchCriteriaId":"05AA74BB-D481-46E1-A609-C15DDA6958F9"},{"vulnerable":true,"criteria":"cpe:2.3:a:sitracker:support_incident_tracker:7.8.00:*:*:*:*:*:*:*","matchCriteriaId":"9300ECD3-C10E-49D3-8E37-4850635B3290"},{"vulnerable":true,"criteria":"cpe:2.3:a:sitracker:support_incident_tracker:8.8.00:*:*:*:*:*:*:*","matchCriteriaId":"94C93EEC-EEF2-416A-97ED-EAEBBFB883C5"},{"vulnerable":true,"criteria":"cpe:2.3:a:sitracker:support_incident_tracker:9.8.00:*:*:*:*:*:*:*","matchCriteriaId":"BA1CB1EB-9BA8-445C-A322-741461CD4D45"},{"vulnerable":true,"criteria":"cpe:2.3:a:sitracker:support_incident_tracker:10.8.00:*:*:*:*:*:*:*","matchCriteriaId":"38294648-4298-48EE-9331-50585A97C6E8"},{"vulnerable":true,"criteria":"cpe:2.3:a:sitracker:support_incident_tracker:11.8.00:*:*:*:*:*:*:*","matchCriteriaId":"D4ED869A-4880-4D99-9138-429D07DF778C"},{"vulnerable":true,"criteria":"cpe:2.3:a:sitracker:support_incident_tracker:14.8.00:*:*:*:*:*:*:*","matchCriteriaId":"4E5A892B-8A11-4E5B-B5A2-837FC7295B47"},{"vulnerable":true,"criteria":"cpe:2.3:a:sitracker:support_incident_tracker:16.8.00:*:*:*:*:*:*:*","matchCriteriaId":"2E0DCD82-24F9-4212-8AD6-340726E26C24"},{"vulnerable":true,"criteria":"cpe:2.3:a:sitracker:support_incident_tracker:17.8.00:*:*:*:*:*:*:*","matchCriteriaId":"9BB2AF8C-B1AC-4164-A389-EC8F1493FE81"},{"vulnerable":true,"criteria":"cpe:2.3:a:sitracker:support_incident_tracker:18.8.00:*:*:*:*:*:*:*","matchCriteriaId":"A8D4DABA-CDA4-4742-AD39-F48590D8A7C3"},{"vulnerable":true,"criteria":"cpe:2.3:a:sitracker:support_incident_tracker:21.8.00:*:*:*:*:*:*:*","matchCriteriaId":"F6771A58-D40C-456B-BF6A-282E8CF291FA"},{"vulnerable":true,"criteria":"cpe:2.3:a:sitracker:support_incident_tracker:31.07.00:*:*:*:*:*:*:*","matchCriteriaId":"F396853A-7D77-44E2-9C51-E6FD65843871"}]}]}],"references":[{"url":"https://www.trustwave.com/spiderlabs/advisories/TWSL2012-012.txt","source":"cve@mitre.org","tags":["Exploit"]},{"url":"https://www.trustwave.com/spiderlabs/advisories/TWSL2012-012.txt","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit"]}]}}]}