{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-07T07:23:04.225","vulnerabilities":[{"cve":{"id":"CVE-2011-4337","sourceIdentifier":"secalert@redhat.com","published":"2012-01-29T11:55:01.830","lastModified":"2026-04-29T01:13:23.040","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Static code injection vulnerability in translate.php in Support Incident Tracker (aka SiT!) 3.45 through 3.65 allows remote attackers to inject arbitrary PHP code into an executable language file in the i18n directory via the lang variable."},{"lang":"es","value":"Vulnerabilidad de inyección de código estático en translate.php en el Support Incident Tracker (también conocido como SIT!) v3.45 a v3.65 permite a atacantes remotos inyectar código PHP de su elección en un archivo de idioma ejecutable en el directorio i18n a través de la variable 'lang'."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-94"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:sitracker:support_incident_tracker:3.6:*:*:*:*:*:*:*","matchCriteriaId":"48854537-091C-4350-A42E-8E6AA19A4C55"},{"vulnerable":true,"criteria":"cpe:2.3:a:sitracker:support_incident_tracker:3.45:*:*:*:*:*:*:*","matchCriteriaId":"65028034-D504-49CF-A62B-827A7F86733E"},{"vulnerable":true,"criteria":"cpe:2.3:a:sitracker:support_incident_tracker:3.45:beta1:*:*:*:*:*:*","matchCriteriaId":"9E4CD2D0-66BF-4E95-B3AE-7598902B2C72"},{"vulnerable":true,"criteria":"cpe:2.3:a:sitracker:support_incident_tracker:3.50:*:*:*:*:*:*:*","matchCriteriaId":"2163711F-8830-471A-A9AE-C4B90DB1BC4C"},{"vulnerable":true,"criteria":"cpe:2.3:a:sitracker:support_incident_tracker:3.50:beta1:*:*:*:*:*:*","matchCriteriaId":"CF3D5C9C-05DE-44A1-AEC2-308E87D2E0CD"},{"vulnerable":true,"criteria":"cpe:2.3:a:sitracker:support_incident_tracker:3.51:*:*:*:*:*:*:*","matchCriteriaId":"7929BFDD-9FA8-422B-945D-6FEC46B89E69"},{"vulnerable":true,"criteria":"cpe:2.3:a:sitracker:support_incident_tracker:3.60:*:*:*:*:*:*:*","matchCriteriaId":"5567EF75-2161-4A74-AADE-109B3F0DFD26"},{"vulnerable":true,"criteria":"cpe:2.3:a:sitracker:support_incident_tracker:3.61:*:*:*:*:*:*:*","matchCriteriaId":"228B6318-F28A-4CB7-A054-5CB1E1C75048"},{"vulnerable":true,"criteria":"cpe:2.3:a:sitracker:support_incident_tracker:3.62:*:*:*:*:*:*:*","matchCriteriaId":"68D7980E-CA09-4A29-9901-47FE92A892E0"},{"vulnerable":true,"criteria":"cpe:2.3:a:sitracker:support_incident_tracker:3.63:*:*:*:*:*:*:*","matchCriteriaId":"59E43ED2-A943-4D8C-AAD2-189647073814"},{"vulnerable":true,"criteria":"cpe:2.3:a:sitracker:support_incident_tracker:3.63:beta1:*:*:*:*:*:*","matchCriteriaId":"F2C5C37A-8952-47E9-A081-A0EBDC7E7AF6"},{"vulnerable":true,"criteria":"cpe:2.3:a:sitracker:support_incident_tracker:3.64:*:*:*:*:*:*:*","matchCriteriaId":"C04580AF-8B83-4F0C-BD04-DCCA1BAB8F1F"},{"vulnerable":true,"criteria":"cpe:2.3:a:sitracker:support_incident_tracker:3.65:*:*:*:*:*:*:*","matchCriteriaId":"691D701C-AEA0-400C-92E9-DAE772E1CBB1"}]}]}],"references":[{"url":"http://bugs.sitracker.org/view.php?id=1737","source":"secalert@redhat.com","tags":["Exploit"]},{"url":"http://www.exploit-db.com/exploits/18132/","source":"secalert@redhat.com","tags":["Exploit"]},{"url":"http://www.openwall.com/lists/oss-security/2011/11/22/3","source":"secalert@redhat.com","tags":["Exploit"]},{"url":"http://www.securityfocus.com/archive/1/520577","source":"secalert@redhat.com","tags":["Exploit"]},{"url":"http://bugs.sitracker.org/view.php?id=1737","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit"]},{"url":"http://www.exploit-db.com/exploits/18132/","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit"]},{"url":"http://www.openwall.com/lists/oss-security/2011/11/22/3","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit"]},{"url":"http://www.securityfocus.com/archive/1/520577","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit"]}]}}]}