Show plain JSON{"id": "CVE-2002-1060", "cveTags": [], "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 4.3, "accessVector": "NETWORK", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "authentication": "NONE", "integrityImpact": "PARTIAL", "accessComplexity": "MEDIUM", "availabilityImpact": "NONE", "confidentialityImpact": "NONE"}, "acInsufInfo": false, "impactScore": 2.9, "baseSeverity": "MEDIUM", "obtainAllPrivilege": false, "exploitabilityScore": 8.6, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}]}, "published": "2002-10-04T04:00:00.000", "references": [{"url": "http://archives.neohapsis.com/archives/bugtraq/2002-07/0283.html", "source": "cve@mitre.org"}, {"url": "http://download.cacheflow.com/release/CA/4.1.00-docs/CACacheOS41fixes.htm", "source": "cve@mitre.org"}, {"url": "http://www.iss.net/security_center/static/9674.php", "tags": ["Patch", "Vendor Advisory"], "source": "cve@mitre.org"}, {"url": "http://www.securityfocus.com/bid/5305", "tags": ["Exploit", "Patch", "Vendor Advisory"], "source": "cve@mitre.org"}, {"url": "http://www.securityfocus.com/bid/5608", "source": "cve@mitre.org"}, {"url": "http://archives.neohapsis.com/archives/bugtraq/2002-07/0283.html", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://download.cacheflow.com/release/CA/4.1.00-docs/CACacheOS41fixes.htm", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.iss.net/security_center/static/9674.php", "tags": ["Patch", "Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.securityfocus.com/bid/5305", "tags": ["Exploit", "Patch", "Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.securityfocus.com/bid/5608", "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Deferred", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "NVD-CWE-Other"}]}], "descriptions": [{"lang": "en", "value": "Cross-site scripting (XSS) vulnerability in Blue Coat Systems (formerly CacheFlow) CacheOS on Client Accelerator 4.1.06, Security Gateway 2.1.02, and Server Accelerator 4.1.06 allows remote attackers to inject arbitrary web script or HTML via a URL to a nonexistent hostname that includes the HTML, which is inserted into the resulting error page."}], "lastModified": "2025-04-03T01:03:51.193", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:bluecoat:cacheos:3.1.17:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B77F092A-BDD8-40F6-A6CD-D3C6D43D4FCF"}, {"criteria": "cpe:2.3:o:bluecoat:cacheos:3.1.18:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0923F90E-A227-4012-8E99-1BAB59E4EA8F"}, {"criteria": "cpe:2.3:o:bluecoat:cacheos:3.1.19:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F5580164-BC65-4ABA-AD5E-0F4BF2E773DC"}, {"criteria": "cpe:2.3:o:bluecoat:cacheos:3.1.21:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9F09D465-AEB5-4097-870E-EE9FC8DE5E35"}, {"criteria": "cpe:2.3:o:bluecoat:cacheos:4.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "162CB5CC-8D1A-47A5-8DBA-5939C172325A"}, {"criteria": "cpe:2.3:o:bluecoat:cacheos:4.0.11:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "598036F6-B86F-4E07-B6AF-93B0A3BA8796"}, {"criteria": "cpe:2.3:o:bluecoat:cacheos:4.0.12:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F8E07872-E0CB-4001-8FA7-5E7DBE9782F6"}, {"criteria": "cpe:2.3:o:bluecoat:cacheos:4.0.13:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C65B2102-085D-4F73-87BD-31EAA5D57218"}, {"criteria": "cpe:2.3:o:bluecoat:cacheos:4.0.14:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C62DED29-29C1-4563-8EA2-53CEA760E795"}, {"criteria": "cpe:2.3:o:bluecoat:cacheos:4.1.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "074A7319-B9B9-4123-A3AF-3B66653C5E8F"}], "operator": "OR"}]}], "sourceIdentifier": "cve@mitre.org"}