{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-07T04:20:14.346","vulnerabilities":[{"cve":{"id":"CVE-2011-2672","sourceIdentifier":"vultures@jpcert.or.jp","published":"2011-09-20T10:55:04.313","lastModified":"2026-04-29T01:13:23.040","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Cross-site scripting (XSS) vulnerability in SemanticScuttle before 0.98 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors."},{"lang":"es","value":"Vulnerabilidad cross-site scripting (XSS) en SemanticScuttle antes de v0.98 permite a atacantes remotos inyectar secuencias de comandos web o HTML a través de vectores no especificados."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:N/I:P/A:N","baseScore":4.3,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":8.6,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-79"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:christian_weiske:semanticscuttle:*:*:*:*:*:*:*:*","versionEndIncluding":"0.97","matchCriteriaId":"2FF12B88-C5A4-42E7-B203-0CF4B4469228"},{"vulnerable":true,"criteria":"cpe:2.3:a:christian_weiske:semanticscuttle:0.85:*:*:*:*:*:*:*","matchCriteriaId":"F8A755B2-98F7-4B32-B9E2-0436D012234B"},{"vulnerable":true,"criteria":"cpe:2.3:a:christian_weiske:semanticscuttle:0.86:*:*:*:*:*:*:*","matchCriteriaId":"EFF69A97-1860-4E00-A79C-95E30CBAEA8D"},{"vulnerable":true,"criteria":"cpe:2.3:a:christian_weiske:semanticscuttle:0.87:*:*:*:*:*:*:*","matchCriteriaId":"5696FB2D-9B7D-4F12-BA25-A11F1F190992"},{"vulnerable":true,"criteria":"cpe:2.3:a:christian_weiske:semanticscuttle:0.88:*:*:*:*:*:*:*","matchCriteriaId":"BB0D5628-5C2B-4049-8454-5949C8BDA1DA"},{"vulnerable":true,"criteria":"cpe:2.3:a:christian_weiske:semanticscuttle:0.89:*:*:*:*:*:*:*","matchCriteriaId":"5BC494CB-13FF-4FF4-B0A1-049D438E4C5F"},{"vulnerable":true,"criteria":"cpe:2.3:a:christian_weiske:semanticscuttle:0.90:*:*:*:*:*:*:*","matchCriteriaId":"F4548F6A-95BC-4441-A56A-6E513FC08D43"},{"vulnerable":true,"criteria":"cpe:2.3:a:christian_weiske:semanticscuttle:0.91:*:*:*:*:*:*:*","matchCriteriaId":"AA76328C-A717-4005-A7E7-1FC10D9940D8"},{"vulnerable":true,"criteria":"cpe:2.3:a:christian_weiske:semanticscuttle:0.92:*:*:*:*:*:*:*","matchCriteriaId":"5032B326-066E-4B7B-B813-6AE60098E874"},{"vulnerable":true,"criteria":"cpe:2.3:a:christian_weiske:semanticscuttle:0.93:*:*:*:*:*:*:*","matchCriteriaId":"2F4FBE22-2714-4C4A-A11D-3E720794AC08"},{"vulnerable":true,"criteria":"cpe:2.3:a:christian_weiske:semanticscuttle:0.94:*:*:*:*:*:*:*","matchCriteriaId":"3CEE3598-BB0C-4327-935E-327FE565139F"},{"vulnerable":true,"criteria":"cpe:2.3:a:christian_weiske:semanticscuttle:0.95:*:*:*:*:*:*:*","matchCriteriaId":"0A286E41-277A-46FA-B34F-C037750A3848"},{"vulnerable":true,"criteria":"cpe:2.3:a:christian_weiske:semanticscuttle:0.96:*:*:*:*:*:*:*","matchCriteriaId":"9A9C832F-C0A6-4AFB-BA6F-226BB14E90A2"}]}]}],"references":[{"url":"http://jvn.jp/en/jp/JVN28973089/index.html","source":"vultures@jpcert.or.jp"},{"url":"http://jvndb.jvn.jp/jvndb/JVNDB-2011-000074","source":"vultures@jpcert.or.jp"},{"url":"http://osvdb.org/75585","source":"vultures@jpcert.or.jp"},{"url":"http://secunia.com/advisories/46031","source":"vultures@jpcert.or.jp","tags":["Vendor Advisory"]},{"url":"http://sourceforge.net/projects/semanticscuttle/files/SemanticScuttle/v0.98/SemanticScuttle-0.98.0.zip/download","source":"vultures@jpcert.or.jp","tags":["Patch"]},{"url":"http://www.securityfocus.com/bid/49661","source":"vultures@jpcert.or.jp"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/69900","source":"vultures@jpcert.or.jp"},{"url":"http://jvn.jp/en/jp/JVN28973089/index.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://jvndb.jvn.jp/jvndb/JVNDB-2011-000074","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://osvdb.org/75585","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://secunia.com/advisories/46031","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"http://sourceforge.net/projects/semanticscuttle/files/SemanticScuttle/v0.98/SemanticScuttle-0.98.0.zip/download","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"]},{"url":"http://www.securityfocus.com/bid/49661","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/69900","source":"af854a3a-2127-422b-91ae-364da2661108"}]}}]}