{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-19T03:32:04.369","vulnerabilities":[{"cve":{"id":"CVE-2011-1662","sourceIdentifier":"cve@mitre.org","published":"2011-04-10T02:51:19.710","lastModified":"2025-04-11T00:51:21.963","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"Cross-site scripting (XSS) vulnerability in Translation Management module 6.x before 6.x-1.21 for Drupal allows remote attackers to inject arbitrary web script or HTML via unspecified vectors."},{"lang":"es","value":"Vulnerabilidad de ejecución de secuencias de comandos en sitios cruzados (XSS) en el módulo Translation Management v6.x anterior a v6.x-1.21 para Drupal, permite a atacantes remotos inyectar secuencias de comando web o HTML a través de vectores no especificados."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:N/I:P/A:N","baseScore":4.3,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":8.6,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-79"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:icanlocalize:translation_management:6.x-1.0:*:*:*:*:*:*:*","matchCriteriaId":"0DEA18B8-BA76-45CA-A8AD-9BB000BBD5A8"},{"vulnerable":true,"criteria":"cpe:2.3:a:icanlocalize:translation_management:6.x-1.0:beta1:*:*:*:*:*:*","matchCriteriaId":"369CBE97-1C27-4541-AC9D-2FB12FEBC529"},{"vulnerable":true,"criteria":"cpe:2.3:a:icanlocalize:translation_management:6.x-1.0:beta2:*:*:*:*:*:*","matchCriteriaId":"F94760AE-8914-4292-87BC-3DD20EF844DD"},{"vulnerable":true,"criteria":"cpe:2.3:a:icanlocalize:translation_management:6.x-1.0:beta3:*:*:*:*:*:*","matchCriteriaId":"4153EA5D-1527-48F9-94B0-FCF38E0BE799"},{"vulnerable":true,"criteria":"cpe:2.3:a:icanlocalize:translation_management:6.x-1.0:beta4:*:*:*:*:*:*","matchCriteriaId":"BB8AB7EB-6AE1-4FBE-B666-9EE5C7236AE1"},{"vulnerable":true,"criteria":"cpe:2.3:a:icanlocalize:translation_management:6.x-1.0:beta5:*:*:*:*:*:*","matchCriteriaId":"1DD67C2B-D3AE-4E18-BC3C-11C7979F7536"},{"vulnerable":true,"criteria":"cpe:2.3:a:icanlocalize:translation_management:6.x-1.0:beta6:*:*:*:*:*:*","matchCriteriaId":"E9A1D8B4-47AB-426A-AC66-44550D2F7192"},{"vulnerable":true,"criteria":"cpe:2.3:a:icanlocalize:translation_management:6.x-1.0:beta7:*:*:*:*:*:*","matchCriteriaId":"0AD0E264-F57E-4538-ADEF-3C59ED0976C6"},{"vulnerable":true,"criteria":"cpe:2.3:a:icanlocalize:translation_management:6.x-1.1:*:*:*:*:*:*:*","matchCriteriaId":"135B43A0-B2B5-4154-8F15-BCC79C0F4A69"},{"vulnerable":true,"criteria":"cpe:2.3:a:icanlocalize:translation_management:6.x-1.2:*:*:*:*:*:*:*","matchCriteriaId":"5B703310-9710-48CB-8385-47AD8057C29F"},{"vulnerable":true,"criteria":"cpe:2.3:a:icanlocalize:translation_management:6.x-1.2:beta1:*:*:*:*:*:*","matchCriteriaId":"FBB892D6-C223-4359-ABE6-5FA2B10699DD"},{"vulnerable":true,"criteria":"cpe:2.3:a:icanlocalize:translation_management:6.x-1.3:*:*:*:*:*:*:*","matchCriteriaId":"25A78AF8-07BC-4F94-8761-F90A09251080"},{"vulnerable":true,"criteria":"cpe:2.3:a:icanlocalize:translation_management:6.x-1.4:*:*:*:*:*:*:*","matchCriteriaId":"9DB65DB8-75A2-4441-8A4A-A7A39DD3A568"},{"vulnerable":true,"criteria":"cpe:2.3:a:icanlocalize:translation_management:6.x-1.5:*:*:*:*:*:*:*","matchCriteriaId":"3D56A42C-5BB0-40DE-9F75-F39207818B8D"},{"vulnerable":true,"criteria":"cpe:2.3:a:icanlocalize:translation_management:6.x-1.6:*:*:*:*:*:*:*","matchCriteriaId":"8AA25ACB-86CA-4FF6-BB51-C027456690AD"},{"vulnerable":true,"criteria":"cpe:2.3:a:icanlocalize:translation_management:6.x-1.7:*:*:*:*:*:*:*","matchCriteriaId":"ED5D2E36-697E-45D7-9485-749CF95D19A1"},{"vulnerable":true,"criteria":"cpe:2.3:a:icanlocalize:translation_management:6.x-1.8:*:*:*:*:*:*:*","matchCriteriaId":"FCC67BE6-4A49-457B-B8D1-4F9CA19E4B66"},{"vulnerable":true,"criteria":"cpe:2.3:a:icanlocalize:translation_management:6.x-1.9:*:*:*:*:*:*:*","matchCriteriaId":"876958DB-8DFB-4826-8209-372C52466BF5"},{"vulnerable":true,"criteria":"cpe:2.3:a:icanlocalize:translation_management:6.x-1.20:*:*:*:*:*:*:*","matchCriteriaId":"F5899E8C-A70E-4142-8CCA-408E1438B836"},{"vulnerable":true,"criteria":"cpe:2.3:a:icanlocalize:translation_management:6.x-1.x:dev:*:*:*:*:*:*","matchCriteriaId":"32A40EBC-EFA1-4A99-A32E-D084A66E5270"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:a:drupal:drupal:*:*:*:*:*:*:*:*","matchCriteriaId":"799CA80B-F3FA-4183-A791-2071A7DA1E54"}]}]}],"references":[{"url":"http://drupal.org/node/1111174","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://secunia.com/advisories/43950","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/47098","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/66475","source":"cve@mitre.org"},{"url":"http://drupal.org/node/1111174","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"http://secunia.com/advisories/43950","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/47098","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/66475","source":"af854a3a-2127-422b-91ae-364da2661108"}]}}]}