{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-25T06:46:34.987","vulnerabilities":[{"cve":{"id":"CVE-2013-0321","sourceIdentifier":"secalert@redhat.com","published":"2013-03-27T21:55:02.283","lastModified":"2025-04-11T00:51:21.963","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"Cross-site scripting (XSS) vulnerability in Views in the Ubercart Views (uc_views) module 6.x before 6.x-3.3 for Drupal allows remote attackers to inject arbitrary web script or HTML via the full name field."},{"lang":"es","value":"Vulnerabilidad de e jecución de secuencias de comandos en sitios cruzados(XSS) en Views en el modulo Ubercart Views (uc_views) v6.x módulo antes de v6.x-3.3 para Drupal que  permite a atacantes remotos inyectar secuencias de comandos web o HTML a través del campo Nombre completo."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:N/I:P/A:N","baseScore":4.3,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":8.6,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-79"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:ubercart_views_project:uc_views:6.x-1.0:*:*:*:*:*:*:*","matchCriteriaId":"9A3AD3A4-224C-4C13-B7B9-37A291134607"},{"vulnerable":true,"criteria":"cpe:2.3:a:ubercart_views_project:uc_views:6.x-1.1:*:*:*:*:*:*:*","matchCriteriaId":"2CE18463-3D75-4BF0-AFEA-40D26D1FCEA3"},{"vulnerable":true,"criteria":"cpe:2.3:a:ubercart_views_project:uc_views:6.x-1.x:dev:*:*:*:*:*:*","matchCriteriaId":"6F3503BA-283A-4D33-9F1A-A0A615D5C4D5"},{"vulnerable":true,"criteria":"cpe:2.3:a:ubercart_views_project:uc_views:6.x-2.0:*:*:*:*:*:*:*","matchCriteriaId":"6F45D3CB-30C5-4554-8594-5DE7DBE6492E"},{"vulnerable":true,"criteria":"cpe:2.3:a:ubercart_views_project:uc_views:6.x-3.0:*:*:*:*:*:*:*","matchCriteriaId":"A33F7740-9855-4CAF-A399-A61A0F0037DA"},{"vulnerable":true,"criteria":"cpe:2.3:a:ubercart_views_project:uc_views:6.x-3.1:*:*:*:*:*:*:*","matchCriteriaId":"07206969-A4BB-4439-A152-7240E71C606A"},{"vulnerable":true,"criteria":"cpe:2.3:a:ubercart_views_project:uc_views:6.x-3.2:*:*:*:*:*:*:*","matchCriteriaId":"68707494-6B99-4E91-9773-6E0F66FEC88E"},{"vulnerable":true,"criteria":"cpe:2.3:a:ubercart_views_project:uc_views:6.x-3.x:dev:*:*:*:*:*:*","matchCriteriaId":"E486FB1A-0A82-4824-BA3E-722AC8C06D74"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:a:drupal:drupal:-:*:*:*:*:*:*:*","matchCriteriaId":"F8B1170D-AD33-4C7A-892D-63AC71B032CF"}]}]}],"references":[{"url":"http://drupal.org/node/1922128","source":"secalert@redhat.com","tags":["Patch"]},{"url":"http://drupal.org/node/1922416","source":"secalert@redhat.com","tags":["Patch","Vendor Advisory"]},{"url":"http://drupalcode.org/project/uc_views.git/commitdiff/157d5d3","source":"secalert@redhat.com"},{"url":"http://www.openwall.com/lists/oss-security/2013/02/21/5","source":"secalert@redhat.com"},{"url":"http://drupal.org/node/1922128","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"]},{"url":"http://drupal.org/node/1922416","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"http://drupalcode.org/project/uc_views.git/commitdiff/157d5d3","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.openwall.com/lists/oss-security/2013/02/21/5","source":"af854a3a-2127-422b-91ae-364da2661108"}]}}]}