2024-12-08 03:06:42 +00:00

172 lines
5.1 KiB
JSON

{
"id": "CVE-2010-4498",
"sourceIdentifier": "cve@mitre.org",
"published": "2011-01-07T19:00:18.547",
"lastModified": "2024-11-21T01:21:05.133",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Unspecified vulnerability in Collaborative Information Manager server, as used in TIBCO Collaborative Information Manager before 8.1.0 and ActiveCatalog before 1.0.1, allows remote attackers to modify data or obtain sensitive information via a crafted URL."
},
{
"lang": "es",
"value": "Vulnerabilidad no especificada en Collaborative Information Manager, como el usado en TIBCO Collaborative Information Manager anteriores a v8.1.0 y ActiveCatalog anteriores a v1.0.1, permite a atacantes remotos la modificaci\u00f3n de datos u obtener informaci\u00f3n sensible a trav\u00e9s de una URL manipulada."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"baseScore": 7.5,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tibco:activecatalog:*:*:*:*:*:*:*:*",
"versionEndIncluding": "1.0",
"matchCriteriaId": "B74F110D-E53A-4712-8C85-C7D192056BF4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tibco:collaborative_information_manager:*:*:*:*:*:*:*:*",
"versionEndIncluding": "8.0",
"matchCriteriaId": "4BEC429E-5352-45F6-8BFF-7287A8D4738B"
}
]
}
]
}
],
"references": [
{
"url": "http://osvdb.org/70373",
"source": "cve@mitre.org"
},
{
"url": "http://secunia.com/advisories/42791",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/45691",
"source": "cve@mitre.org"
},
{
"url": "http://www.securitytracker.com/id?1024942",
"source": "cve@mitre.org"
},
{
"url": "http://www.tibco.com/multimedia/cim_advisory_20110105_tcm8-12765.txt",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.tibco.com/services/support/advisories/cim-advisory_20100105.jsp",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.vupen.com/english/advisories/2011/0037",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64522",
"source": "cve@mitre.org"
},
{
"url": "http://osvdb.org/70373",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://secunia.com/advisories/42791",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/45691",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.securitytracker.com/id?1024942",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.tibco.com/multimedia/cim_advisory_20110105_tcm8-12765.txt",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.tibco.com/services/support/advisories/cim-advisory_20100105.jsp",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.vupen.com/english/advisories/2011/0037",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64522",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
],
"evaluatorSolution": "Per: http://www.tibco.com/services/support/advisories/cim-advisory_20100105.jsp\r\n\r\n'Customers with current maintenance can obtain product updates through their TIBCO fulfillment channels.'"
}