Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:tibco:spotfire_analytics_server:*:*:*:*:*:*:*:*", "matchCriteriaId": "FD8B38CE-0977-4B25-B706-58F6F4837040", "versionEndIncluding": "10.0.1", "vulnerable": true}, {"criteria": "cpe:2.3:a:tibco:spotfire_analytics_server:10.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "0B311C43-60C3-48FD-8D15-011494976DF4", "vulnerable": true}, {"criteria": "cpe:2.3:a:tibco:spotfire_server:3.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "5EAD01FF-01E7-4227-85A7-151710F09C7A", "vulnerable": true}, {"criteria": "cpe:2.3:a:tibco:spotfire_server:3.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "53A8389F-EF56-4AE8-A6E7-1FD27909841E", "vulnerable": true}, {"criteria": "cpe:2.3:a:tibco:spotfire_server:3.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "AB808329-4833-44E6-8899-7ACC595A7532", "vulnerable": true}, {"criteria": "cpe:2.3:a:tibco:spotfire_server:3.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "287F7473-7880-47E4-AAD5-3F0893451B47", "vulnerable": true}, {"criteria": "cpe:2.3:a:tibco:spotfire_server:3.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "B26AB0F6-0A8E-42CE-9D01-54567C73AE2C", "vulnerable": true}, {"criteria": "cpe:2.3:a:tibco:spotfire_server:3.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "5A54C6A5-827C-4FD3-A102-E6400A4A9DC5", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "cveTags": [], "descriptions": [{"lang": "en", "value": "Unspecified vulnerability in TIBCO Spotfire Server 3.0.x before 3.0.2, 3.1.x before 3.1.2, 3.2.x before 3.2.1, and 3.3.x before 3.3.1, and Spotfire Analytics Server before 10.1.1, allows remote attackers to modify data or obtain sensitive information via a crafted URL."}, {"lang": "es", "value": "Vulnerabilidad no especificada en TIBICO Spotfire Server v3.0.x antes de v3.0.2, v3.1.x antes de v3.1.2, v3.2.x antes de v3.2.1, y v3.3.x antes de v3.3.1, y Spotfire Analytics Server antes de v10.1.1, permite a atacantes remotos modificar datos y obtener informacion sensible a trav\u00e9s de una URL modificada"}], "id": "CVE-2011-3134", "lastModified": "2025-04-11T00:51:21.963", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": {"accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0"}, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}]}, "published": "2011-09-02T16:55:06.850", "references": [{"source": "cve@mitre.org", "tags": ["Vendor Advisory"], "url": "http://secunia.com/advisories/45864"}, {"source": "cve@mitre.org", "url": "http://www.securitytracker.com/id?1025999"}, {"source": "cve@mitre.org", "tags": ["Vendor Advisory"], "url": "http://www.tibco.com/multimedia/spotfire_advisory_20110831_tcm8-14230.txt"}, {"source": "cve@mitre.org", "tags": ["Vendor Advisory"], "url": "http://www.tibco.com/services/support/advisories/default.jsp"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "http://secunia.com/advisories/45864"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1025999"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "http://www.tibco.com/multimedia/spotfire_advisory_20110831_tcm8-14230.txt"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "http://www.tibco.com/services/support/advisories/default.jsp"}], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [{"description": [{"lang": "en", "value": "NVD-CWE-noinfo"}], "source": "nvd@nist.gov", "type": "Primary"}]}