Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:aveva:clearscada:2005:*:*:*:*:*:*:*", "matchCriteriaId": "FB367177-4A97-43C3-BD7E-1D051CC0EF6A", "vulnerable": true}, {"criteria": "cpe:2.3:a:aveva:clearscada:2007:*:*:*:*:*:*:*", "matchCriteriaId": "8396238B-F58F-4B45-8831-F489134B43D9", "vulnerable": true}, {"criteria": "cpe:2.3:a:aveva:clearscada:2009:*:*:*:*:*:*:*", "matchCriteriaId": "07EB578D-750D-46F0-BC7D-2CAB4FFB6BA5", "vulnerable": true}], "negate": false, "operator": "OR"}]}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:schneider-electric:scx_67:*:*:*:*:*:*:*:*", "matchCriteriaId": "86BA38FC-5782-469D-BF9C-2D6D34E81AFC", "versionEndExcluding": "r4.5", "vulnerable": true}, {"criteria": "cpe:2.3:a:schneider-electric:scx_68:*:*:*:*:*:*:*:*", "matchCriteriaId": "F8C5848D-CDFF-4799-8271-7CDB9C712B8F", "versionEndExcluding": "r3.9", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "cveTags": [], "descriptions": [{"lang": "en", "value": "Cross-site scripting (XSS) vulnerability in Control Microsystems ClearSCADA 2005, 2007, and 2009 before R2.3 and R1.4, as used in SCX before 67 R4.5 and 68 R3.9, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors."}, {"lang": "es", "value": "Vulnerabilidad de secuencias de comandos en sitios cruzados (XSS) en Control Microsystems ClearSCADA 2005, 2007 y 2009 en versiones anteriores a la R2.3 y R1.4, como se utiliza en SCX anteriores a 67 R4.5 y 68 R3.9, permite a usuarios remotos inyectar codigo de script web o c\u00f3digo HTML de su elecci\u00f3n a trav\u00e9s de vectores sin especificar."}], "id": "CVE-2011-3144", "lastModified": "2025-04-11T00:51:21.963", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": {"accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0"}, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true}]}, "published": "2011-08-16T21:55:01.427", "references": [{"source": "cve@mitre.org", "tags": ["Third Party Advisory"], "url": "http://secunia.com/advisories/44955"}, {"source": "cve@mitre.org", "tags": ["Third Party Advisory"], "url": "http://www.digitalbond.com/scadapedia/vulnerability-notes/control-microsystems-cross-site-scripting-vulnerability/"}, {"source": "cve@mitre.org", "tags": ["Broken Link"], "url": "http://www.osvdb.org/72987"}, {"source": "cve@mitre.org", "tags": ["Patch", "Third Party Advisory", "US Government Resource"], "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-10-314-01.pdf"}, {"source": "cve@mitre.org", "tags": ["Patch", "Third Party Advisory", "US Government Resource"], "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-10-314-01A.pdf"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Third Party Advisory"], "url": "http://secunia.com/advisories/44955"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Third Party Advisory"], "url": "http://www.digitalbond.com/scadapedia/vulnerability-notes/control-microsystems-cross-site-scripting-vulnerability/"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Broken Link"], "url": "http://www.osvdb.org/72987"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch", "Third Party Advisory", "US Government Resource"], "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-10-314-01.pdf"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch", "Third Party Advisory", "US Government Resource"], "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-10-314-01A.pdf"}], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-79"}], "source": "nvd@nist.gov", "type": "Primary"}]}