Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:tibco:spotfire_analytics_server:*:*:*:*:*:*:*:*", "matchCriteriaId": "FD8B38CE-0977-4B25-B706-58F6F4837040", "versionEndIncluding": "10.0.1", "vulnerable": true}, {"criteria": "cpe:2.3:a:tibco:spotfire_analytics_server:10.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "0B311C43-60C3-48FD-8D15-011494976DF4", "vulnerable": true}, {"criteria": "cpe:2.3:a:tibco:spotfire_server:3.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "5EAD01FF-01E7-4227-85A7-151710F09C7A", "vulnerable": true}, {"criteria": "cpe:2.3:a:tibco:spotfire_server:3.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "53A8389F-EF56-4AE8-A6E7-1FD27909841E", "vulnerable": true}, {"criteria": "cpe:2.3:a:tibco:spotfire_server:3.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "AB808329-4833-44E6-8899-7ACC595A7532", "vulnerable": true}, {"criteria": "cpe:2.3:a:tibco:spotfire_server:3.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "287F7473-7880-47E4-AAD5-3F0893451B47", "vulnerable": true}, {"criteria": "cpe:2.3:a:tibco:spotfire_server:3.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "B26AB0F6-0A8E-42CE-9D01-54567C73AE2C", "vulnerable": true}, {"criteria": "cpe:2.3:a:tibco:spotfire_server:3.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "5A54C6A5-827C-4FD3-A102-E6400A4A9DC5", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "cveTags": [], "descriptions": [{"lang": "en", "value": "Cross-site scripting (XSS) vulnerability in TIBCO Spotfire Server 3.0.x before 3.0.2, 3.1.x before 3.1.2, 3.2.x before 3.2.1, and 3.3.x before 3.3.1, and Spotfire Analytics Server before 10.1.1, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors."}, {"lang": "es", "value": "Vulnerabilidad de ejecuci\u00f3n de secuencias de comandos en sitios cruzados en TIBCO Spotfire Server v3.0.x antes de v3.0.2, v3.1.x antes de v3.1.2, v3.2.x antes de v3.2.1, y v3.3.x antes de v3.3.1, and Spotfire Analytics Server antes de v10.1.1, permite a atacantes remotos inyectar secuencias de comandos web y HTML a traves de vectores no especificados."}], "id": "CVE-2011-3132", "lastModified": "2025-04-11T00:51:21.963", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": {"accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0"}, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true}]}, "published": "2011-09-02T16:55:06.757", "references": [{"source": "cve@mitre.org", "tags": ["Vendor Advisory"], "url": "http://secunia.com/advisories/45864"}, {"source": "cve@mitre.org", "url": "http://www.securitytracker.com/id?1025999"}, {"source": "cve@mitre.org", "tags": ["Vendor Advisory"], "url": "http://www.tibco.com/multimedia/spotfire_advisory_20110831_tcm8-14230.txt"}, {"source": "cve@mitre.org", "tags": ["Vendor Advisory"], "url": "http://www.tibco.com/services/support/advisories/default.jsp"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "http://secunia.com/advisories/45864"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1025999"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "http://www.tibco.com/multimedia/spotfire_advisory_20110831_tcm8-14230.txt"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "http://www.tibco.com/services/support/advisories/default.jsp"}], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-79"}], "source": "nvd@nist.gov", "type": "Primary"}]}