{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-19T12:36:53.819","vulnerabilities":[{"cve":{"id":"CVE-2002-0682","sourceIdentifier":"cve@mitre.org","published":"2002-07-23T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Cross-site scripting vulnerability in Apache Tomcat 4.0.3 allows remote attackers to execute script as other web users via script in a URL with the /servlet/ mapping, which does not filter the script when an exception is thrown by the servlet."},{"lang":"es","value":"Vulnerabilidad de secuencias de comandos en sitios cruzados (cross-site scripting) en Apache Tomcat 4.0.3 permite a atacantes remotos ejecutar secuencias de comandos como otro usuario web mediante un script en la URL mapeado a /servlet/, que no filtra el script cuando una excepción es lanzada por el servelt (throw exception de Java)"}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":true,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:apache:tomcat:4.0.3:*:*:*:*:*:*:*","matchCriteriaId":"0BFE5AD8-DB14-4632-9D2A-F2013579CA7D"}]}]}],"references":[{"url":"http://archives.neohapsis.com/archives/vulnwatch/2002-q3/0014.html","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://marc.info/?l=bugtraq&m=102631703811297&w=2","source":"cve@mitre.org"},{"url":"http://www.osvdb.org/4973","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/5193","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/9520","source":"cve@mitre.org"},{"url":"https://lists.apache.org/thread.html/29dc6c2b625789e70a9c4756b5a327e6547273ff8bde7e0327af48c5%40%3Cdev.tomcat.apache.org%3E","source":"cve@mitre.org"},{"url":"https://lists.apache.org/thread.html/c62b0e3a7bf23342352a5810c640a94b6db69957c5c19db507004d74%40%3Cdev.tomcat.apache.org%3E","source":"cve@mitre.org"},{"url":"https://lists.apache.org/thread.html/rb71997f506c6cc8b530dd845c084995a9878098846c7b4eacfae8db3%40%3Cdev.tomcat.apache.org%3E","source":"cve@mitre.org"},{"url":"http://archives.neohapsis.com/archives/vulnwatch/2002-q3/0014.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"http://marc.info/?l=bugtraq&m=102631703811297&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.osvdb.org/4973","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/5193","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/9520","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://lists.apache.org/thread.html/29dc6c2b625789e70a9c4756b5a327e6547273ff8bde7e0327af48c5%40%3Cdev.tomcat.apache.org%3E","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://lists.apache.org/thread.html/c62b0e3a7bf23342352a5810c640a94b6db69957c5c19db507004d74%40%3Cdev.tomcat.apache.org%3E","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://lists.apache.org/thread.html/rb71997f506c6cc8b530dd845c084995a9878098846c7b4eacfae8db3%40%3Cdev.tomcat.apache.org%3E","source":"af854a3a-2127-422b-91ae-364da2661108"}]}}]}