{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-07T04:20:16.832","vulnerabilities":[{"cve":{"id":"CVE-2007-5545","sourceIdentifier":"cve@mitre.org","published":"2007-10-18T20:17:00.000","lastModified":"2026-04-23T00:35:47.467","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Format string vulnerability in TIBCO SmartPGM FX allows remote attackers to execute arbitrary code via format string specifiers in unspecified vectors.  NOTE: as of 20071016, the only disclosure is a vague pre-advisory with no actionable information. However, since it is from a well-known researcher, it is being assigned a CVE identifier for tracking purposes."},{"lang":"es","value":"Vulnerabilidad de cadena de formato en TIBCO SmartPGM FX permite a atacantes remotos ejecutar código de su elección mediante vectores no especificados. NOTA: a fecha de 16/10/2007, la única revelación es un preaviso vago sin información de uso inmediato. Sin embargo, dado que proviene de un investigador reputado, se le ha asignado un identificador CVE con propósitos de seguimiento."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":true,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-134"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:tibco:smart_pgm_fx:*:*:*:*:*:*:*:*","matchCriteriaId":"3F1AD267-E214-44CF-B03F-0EAD5344440E"}]}]}],"references":[{"url":"http://osvdb.org/45276","source":"cve@mitre.org"},{"url":"http://securityreason.com/securityalert/3249","source":"cve@mitre.org"},{"url":"http://www.irmplc.com/index.php/111-Vendor-Alerts","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/archive/1/482353/100/0/threaded","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/26092","source":"cve@mitre.org"},{"url":"http://osvdb.org/45276","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://securityreason.com/securityalert/3249","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.irmplc.com/index.php/111-Vendor-Alerts","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/archive/1/482353/100/0/threaded","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/26092","source":"af854a3a-2127-422b-91ae-364da2661108"}]}}]}