{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-02T14:36:52.675","vulnerabilities":[{"cve":{"id":"CVE-2019-12782","sourceIdentifier":"cve@mitre.org","published":"2019-07-09T16:15:12.963","lastModified":"2024-11-21T04:23:34.110","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"An authorization bypass vulnerability in pinboard updates in ThoughtSpot 4.4.1 through 5.1.1 (before 5.1.2) allows a low-privilege user with write access to at least one pinboard to corrupt pinboards of another user in the application by spoofing GUIDs in pinboard update requests, effectively deleting them."},{"lang":"es","value":"Una vulnerabilidad de omisión de autorización en las actualizaciones de pinboard en ThoughtSpot versiones 4.4.1 hasta 5.1.1 (anteriores a 5.1.2), permite a un usuario con pocos privilegios, con acceso de escritura en al menos un pinboard, dañar los pinboards de otro usuario en la aplicación al falsificar los GUID en la petición de actualización de pinboard, eliminándolos efectivamente."}],"metrics":{"cvssMetricV30":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H","baseScore":8.1,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.2}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:S/C:N/I:P/A:P","baseScore":5.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"SINGLE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":8.0,"impactScore":4.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-639"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:thoughtspot:thoughtspot:*:*:*:*:*:*:*:*","versionStartIncluding":"4.4.1","versionEndIncluding":"5.1.1","matchCriteriaId":"C14E56A1-D7B8-4024-AA22-2E9F3754EE8E"}]}]}],"references":[{"url":"https://docs.thoughtspot.com/5.1/release/notes.html","source":"cve@mitre.org","tags":["Release Notes","Vendor Advisory"]},{"url":"https://www.vsecurity.com/download/advisories/201912782-1.txt","source":"cve@mitre.org","tags":["Third Party Advisory"]},{"url":"https://www.vsecurity.com/resources/advisories.html","source":"cve@mitre.org","tags":["Third Party Advisory"]},{"url":"https://docs.thoughtspot.com/5.1/release/notes.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Release Notes","Vendor Advisory"]},{"url":"https://www.vsecurity.com/download/advisories/201912782-1.txt","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]},{"url":"https://www.vsecurity.com/resources/advisories.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]}]}}]}