2024-12-08 03:06:42 +00:00

172 lines
5.0 KiB
JSON

{
"id": "CVE-2010-4496",
"sourceIdentifier": "cve@mitre.org",
"published": "2011-01-07T19:00:18.233",
"lastModified": "2024-11-21T01:21:04.843",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Multiple SQL injection vulnerabilities in Collaborative Information Manager server, as used in TIBCO Collaborative Information Manager before 8.1.0 and ActiveCatalog before 1.0.1, allow remote attackers to execute arbitrary SQL commands via unspecified vectors."
},
{
"lang": "es",
"value": "M\u00faltiples vulnerabilidades de inyecci\u00f3n SQL en Collaborative Information Manager, como el que se usa en TIBCO Collaborative Information Manager anteriores a v8.1.0 y ActiveCatalog anteriores a 1.0.1, permite a atacantes remotos ejecutar comandos SQL a trav\u00e9s de vectores no especificados."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"baseScore": 7.5,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tibco:activecatalog:*:*:*:*:*:*:*:*",
"versionEndIncluding": "1.0",
"matchCriteriaId": "B74F110D-E53A-4712-8C85-C7D192056BF4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tibco:collaborative_information_manager:*:*:*:*:*:*:*:*",
"versionEndIncluding": "8.0",
"matchCriteriaId": "4BEC429E-5352-45F6-8BFF-7287A8D4738B"
}
]
}
]
}
],
"references": [
{
"url": "http://osvdb.org/70371",
"source": "cve@mitre.org"
},
{
"url": "http://secunia.com/advisories/42791",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/45691",
"source": "cve@mitre.org"
},
{
"url": "http://www.securitytracker.com/id?1024942",
"source": "cve@mitre.org"
},
{
"url": "http://www.tibco.com/multimedia/cim_advisory_20110105_tcm8-12765.txt",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.tibco.com/services/support/advisories/cim-advisory_20100105.jsp",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.vupen.com/english/advisories/2011/0037",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64520",
"source": "cve@mitre.org"
},
{
"url": "http://osvdb.org/70371",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://secunia.com/advisories/42791",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/45691",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.securitytracker.com/id?1024942",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.tibco.com/multimedia/cim_advisory_20110105_tcm8-12765.txt",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.tibco.com/services/support/advisories/cim-advisory_20100105.jsp",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.vupen.com/english/advisories/2011/0037",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64520",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
],
"evaluatorSolution": "Per: http://www.tibco.com/services/support/advisories/cim-advisory_20100105.jsp\r\n\r\n'Customers with current maintenance can obtain product updates through their TIBCO fulfillment channels.'"
}