Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:combodo:itop:*:-:*:*:*:*:*:*", "matchCriteriaId": "9C44A4C5-72A6-403F-A90C-23483B64EB88", "versionEndIncluding": "2.0", "vulnerable": true}, {"criteria": "cpe:2.3:a:combodo:itop:0.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "CF9DE6FB-988A-44AC-A2BB-8390794E653C", "vulnerable": true}, {"criteria": "cpe:2.3:a:combodo:itop:0.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "63EA7687-BF29-47E9-9160-FD1B2AC04EEC", "vulnerable": true}, {"criteria": "cpe:2.3:a:combodo:itop:0.8:*:*:*:*:*:*:*", "matchCriteriaId": "2431290A-D457-4661-AA7A-A40E89E61D26", "vulnerable": true}, {"criteria": "cpe:2.3:a:combodo:itop:0.8.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "DC989807-E7F7-4C70-AE12-30EA6B58D6C3", "vulnerable": true}, {"criteria": "cpe:2.3:a:combodo:itop:0.9:-:*:*:*:*:*:*", "matchCriteriaId": "2BD07CFA-710A-4CD5-8671-DAE0A9BADD0A", "vulnerable": true}, {"criteria": "cpe:2.3:a:combodo:itop:0.9:beta:*:*:*:*:*:*", "matchCriteriaId": "B4370A6A-DA1F-480F-9AF1-85DF2FB1B3E6", "vulnerable": true}, {"criteria": "cpe:2.3:a:combodo:itop:0.9.1:*:*:*:*:*:*:*", "matchCriteriaId": "510B8142-2ED5-4E38-A83D-BE4D5A1C3653", "vulnerable": true}, {"criteria": "cpe:2.3:a:combodo:itop:1.0:-:*:*:*:*:*:*", "matchCriteriaId": "787C3ACC-6474-4E0D-9F99-F98F569208D5", "vulnerable": true}, {"criteria": "cpe:2.3:a:combodo:itop:1.0:beta:*:*:*:*:*:*", "matchCriteriaId": "809C9EAD-5D9F-4688-85A0-31EED3C4CD9F", "vulnerable": true}, {"criteria": "cpe:2.3:a:combodo:itop:1.0.1:-:*:*:*:*:*:*", "matchCriteriaId": "EC290203-5266-4833-89C8-5CC64AE0DFB3", "vulnerable": true}, {"criteria": "cpe:2.3:a:combodo:itop:1.0.2:-:*:*:*:*:*:*", "matchCriteriaId": "500B8295-FA1F-4589-A8C3-12CA580E9502", "vulnerable": true}, {"criteria": "cpe:2.3:a:combodo:itop:1.0.2:beta:*:*:*:*:*:*", "matchCriteriaId": "4C5E42C2-3EFE-4890-9BAE-B994AF09B871", "vulnerable": true}, {"criteria": "cpe:2.3:a:combodo:itop:1.1:-:*:*:*:*:*:*", "matchCriteriaId": "B98E12CB-8114-4459-BB65-461DC3945629", "vulnerable": true}, {"criteria": "cpe:2.3:a:combodo:itop:1.1:beta:*:*:*:*:*:*", "matchCriteriaId": "A14B7FD5-9B89-4193-B6A3-05846E457BC2", "vulnerable": true}, {"criteria": "cpe:2.3:a:combodo:itop:1.1.181:*:*:*:*:*:*:*", "matchCriteriaId": "9F9E3F71-8F14-4EC9-914D-B4E755D87D93", "vulnerable": true}, {"criteria": "cpe:2.3:a:combodo:itop:1.2:-:*:*:*:*:*:*", "matchCriteriaId": "61A46A0A-D58F-4E0C-A19B-E8136C1F0DF9", "vulnerable": true}, {"criteria": "cpe:2.3:a:combodo:itop:1.2:beta:*:*:*:*:*:*", "matchCriteriaId": "3E8A8DE9-B9B7-4FD7-B594-47824DDDE9AE", "vulnerable": true}, {"criteria": "cpe:2.3:a:combodo:itop:1.2.0:-:*:*:*:*:*:*", "matchCriteriaId": "F94FC697-148B-44AC-B0F5-1F53678ABB2B", "vulnerable": true}, {"criteria": "cpe:2.3:a:combodo:itop:1.2.0:rc282:*:*:*:*:*:*", "matchCriteriaId": "405DE014-374E-409B-B028-B2D71DC23293", "vulnerable": true}, {"criteria": "cpe:2.3:a:combodo:itop:1.2.1:-:*:*:*:*:*:*", "matchCriteriaId": "930D3488-8F4D-4C52-A324-B3F57B4ECC77", "vulnerable": true}, {"criteria": "cpe:2.3:a:combodo:itop:1.2.1:beta:*:*:*:*:*:*", "matchCriteriaId": "7088E742-5EAC-4ABD-B039-2FB1DCD98420", "vulnerable": true}, {"criteria": "cpe:2.3:a:combodo:itop:2.0:beta:*:*:*:*:*:*", "matchCriteriaId": "0A733617-26F0-4681-834B-ACDE27516181", "vulnerable": true}, {"criteria": "cpe:2.3:a:combodo:itop:2.0:beta2:*:*:*:*:*:*", "matchCriteriaId": "C5A0B309-D550-4554-8E85-00A1AA4E456A", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "cveTags": [], "descriptions": [{"lang": "en", "value": "Multiple cross-site scripting (XSS) vulnerabilities in the search feature in iTop (aka IT Operations Portal) 2.0, 1.2.1, 1.2, and earlier allow remote attackers to inject arbitrary web script or HTML via the (1) text parameter to pages/UI.php or (2) expression parameter to pages/run_query.php. NOTE: some of these details are obtained from third party information."}, {"lang": "es", "value": "M\u00faltiples vulnerabilidades de XSS en la funcionalidad de b\u00fasqueda en iTop (tambi\u00e9n conocido como IT Operations Portal) 2.0, 1.2.1, 1.2 y anteriores permiten a atacantes remotos inyectar script Web o HTML arbitrarios a trav\u00e9s del (1) par\u00e1metro text hacia pages/UI.php o (2) par\u00e1metro expression hacia pages/run_query.php. NOTA: algunos de estos detalles se obtiene de informaci\u00f3n de terceras partes."}], "id": "CVE-2013-0805", "lastModified": "2025-04-12T10:46:40.837", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": {"accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0"}, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true}]}, "published": "2014-03-20T16:55:05.260", "references": [{"source": "cve@mitre.org", "url": "http://archives.neohapsis.com/archives/fulldisclosure/2013-01/0208.html"}, {"source": "cve@mitre.org", "url": "http://osvdb.org/89574"}, {"source": "cve@mitre.org", "url": "http://packetstormsecurity.com/files/119767/iTop-Cross-Site-Scripting.html"}, {"source": "cve@mitre.org", "url": "http://seclists.org/bugtraq/2013/Jan/102"}, {"source": "cve@mitre.org", "tags": ["Vendor Advisory"], "url": "http://secunia.com/advisories/51702"}, {"source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/81498"}, {"source": "cve@mitre.org", "url": "https://www.csnc.ch/misc/files/advisories/CVE-2013-0805.txt"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://archives.neohapsis.com/archives/fulldisclosure/2013-01/0208.html"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/89574"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://packetstormsecurity.com/files/119767/iTop-Cross-Site-Scripting.html"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://seclists.org/bugtraq/2013/Jan/102"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "http://secunia.com/advisories/51702"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/81498"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.csnc.ch/misc/files/advisories/CVE-2013-0805.txt"}], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-79"}], "source": "nvd@nist.gov", "type": "Primary"}]}