{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-05T00:02:49.078","vulnerabilities":[{"cve":{"id":"CVE-2018-12411","sourceIdentifier":"security@tibco.com","published":"2018-11-06T23:29:00.230","lastModified":"2024-11-21T03:45:10.317","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The administrative daemon (tibdgadmind) of TIBCO Software Inc.'s TIBCO ActiveSpaces - Community Edition, TIBCO ActiveSpaces - Developer Edition, and TIBCO ActiveSpaces - Enterprise Edition contains a vulnerability which may allow an attacker to perform cross-site request forgery (CSRF) attacks. Affected releases are TIBCO Software Inc.'s TIBCO ActiveSpaces - Community Edition: 3.3.0; 3.4.0; 3.5.0, TIBCO ActiveSpaces - Developer Edition: 3.0.0; 3.1.0; 3.3.0; 3.4.0; 3.5.0, and TIBCO ActiveSpaces - Enterprise Edition: 3.0.0; 3.1.0; 3.2.0; 3.3.0; 3.4.0; 3.5.0."},{"lang":"es","value":"El demonio administrativo (tibdgadmind) de TIBCO ActiveSpaces - Community Edition, TIBCO ActiveSpaces - Developer Edition y TIBCO ActiveSpaces - Enterprise Edition, de TIBCO Software Inc., contiene una vulnerabilidad que podría permitir que un atacante realice ataques de Cross-Site Request Forgery (CSRF). Las versiones afectadas son las siguientes: TIBCO ActiveSpaces - Community Edition: 3.3.0; 3.4.0; 3.5.0; TIBCO ActiveSpaces - Developer Edition: 3.0.0; 3.1.0; 3.3.0; 3.4.0; 3.5.0; y TIBCO ActiveSpaces - Enterprise Edition: 3.0.0; 3.1.0; 3.2.0; 3.3.0; 3.4.0 y 3.5.0."}],"metrics":{"cvssMetricV30":[{"source":"security@tibco.com","type":"Secondary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.6,"impactScore":5.9},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","baseScore":8.8,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.9}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:P/I:P/A:P","baseScore":6.8,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":8.6,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-352"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:tibco:activespaces:3.0.0:*:*:*:developer:*:*:*","matchCriteriaId":"26A65290-4462-41FD-9602-4991D5A0D578"},{"vulnerable":true,"criteria":"cpe:2.3:a:tibco:activespaces:3.0.0:*:*:*:enterprise:*:*:*","matchCriteriaId":"B6D969A4-95F9-4877-B4ED-4BC54F2A3D37"},{"vulnerable":true,"criteria":"cpe:2.3:a:tibco:activespaces:3.1.0:*:*:*:developer:*:*:*","matchCriteriaId":"72D84F48-2BC1-44D4-BF57-4F53C921BF7D"},{"vulnerable":true,"criteria":"cpe:2.3:a:tibco:activespaces:3.1.0:*:*:*:enterprise:*:*:*","matchCriteriaId":"DFD369AE-67CE-4CEA-B389-5CEBD48A8586"},{"vulnerable":true,"criteria":"cpe:2.3:a:tibco:activespaces:3.2.0:*:*:*:enterprise:*:*:*","matchCriteriaId":"8AC19705-96A9-4752-A08F-DCBBEDBCCD5C"},{"vulnerable":true,"criteria":"cpe:2.3:a:tibco:activespaces:3.3.0:*:*:*:community:*:*:*","matchCriteriaId":"19990D0E-3616-4BEF-B695-7AA6092FC5E8"},{"vulnerable":true,"criteria":"cpe:2.3:a:tibco:activespaces:3.3.0:*:*:*:developer:*:*:*","matchCriteriaId":"4F058395-B0FA-452E-AAEF-807E6A1E58C9"},{"vulnerable":true,"criteria":"cpe:2.3:a:tibco:activespaces:3.3.0:*:*:*:enterprise:*:*:*","matchCriteriaId":"01C9B3B4-D5DB-4415-9994-C75B1BA97DAD"},{"vulnerable":true,"criteria":"cpe:2.3:a:tibco:activespaces:3.4.0:*:*:*:community:*:*:*","matchCriteriaId":"9BE529F2-0745-4942-9148-8AC62EEDE8D6"},{"vulnerable":true,"criteria":"cpe:2.3:a:tibco:activespaces:3.4.0:*:*:*:developer:*:*:*","matchCriteriaId":"51203932-C85B-4E7C-A3AC-E30B5BC4CAA8"},{"vulnerable":true,"criteria":"cpe:2.3:a:tibco:activespaces:3.4.0:*:*:*:enterprise:*:*:*","matchCriteriaId":"C3D9EF5F-9D55-40D3-BB9C-9156E7CAFDFD"},{"vulnerable":true,"criteria":"cpe:2.3:a:tibco:activespaces:3.5.0:*:*:*:community:*:*:*","matchCriteriaId":"97A8840C-082F-4E5A-8761-F785B4B128AF"},{"vulnerable":true,"criteria":"cpe:2.3:a:tibco:activespaces:3.5.0:*:*:*:developer:*:*:*","matchCriteriaId":"F590E782-E08C-4756-9C5E-D53146043579"},{"vulnerable":true,"criteria":"cpe:2.3:a:tibco:activespaces:3.5.0:*:*:*:enterprise:*:*:*","matchCriteriaId":"1ABC7D09-5465-415D-AC8B-B08AF42D500A"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/105869","source":"security@tibco.com","tags":["Third Party Advisory","VDB Entry"]},{"url":"http://www.tibco.com/services/support/advisories","source":"security@tibco.com","tags":["Vendor Advisory"]},{"url":"https://www.tibco.com/support/advisories/2018/11/tibco-security-advisory-november-6-2018-tibco-activespaces","source":"security@tibco.com","tags":["Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/105869","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","VDB Entry"]},{"url":"http://www.tibco.com/services/support/advisories","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"https://www.tibco.com/support/advisories/2018/11/tibco-security-advisory-november-6-2018-tibco-activespaces","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}