{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-04T20:27:47.102","vulnerabilities":[{"cve":{"id":"CVE-2016-9091","sourceIdentifier":"secure@symantec.com","published":"2017-04-05T15:59:00.170","lastModified":"2025-04-20T01:37:25.860","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"Blue Coat Advanced Secure Gateway (ASG) 6.6 before 6.6.5.4 and Content Analysis System (CAS) 1.3 before 1.3.7.4 are susceptible to an OS command injection vulnerability. An authenticated malicious administrator can execute arbitrary OS commands with elevated system privileges."},{"lang":"es","value":"Blue Coat Advanced Security Gateway (ASG) 6.6 en versiones anteriores a 6.6.5.4 y el Sistema de Análisis de Contenido (CAS) 1.3 en versiones anteriores a 1.3.7.4 son susceptibles a una vulnerabilidad de inyección de comandos de OS. Un administrador malicioso autenticado puede ejecutar comandos de OS arbitrarios con privilegios de sistema elevados."}],"metrics":{"cvssMetricV30":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H","baseScore":7.2,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.2,"impactScore":5.9}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:S/C:C/I:C/A:C","baseScore":9.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"SINGLE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":8.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-78"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:bluecoat:advanced_secure_gateway:*:*:*:*:*:*:*:*","versionEndIncluding":"6.6.5.2","matchCriteriaId":"2C0D9329-D60D-40F9-AE40-B5EDE0B52AB5"},{"vulnerable":true,"criteria":"cpe:2.3:a:bluecoat:content_analysis_system_software:*:*:*:*:*:*:*:*","versionEndIncluding":"1.3.7.3","matchCriteriaId":"DEFA49F6-C7C2-4450-9067-E06368A33C85"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/97372","source":"secure@symantec.com","tags":["Third Party Advisory","VDB Entry"]},{"url":"https://bto.bluecoat.com/security-advisory/sa138","source":"secure@symantec.com","tags":["Mitigation","Vendor Advisory"]},{"url":"https://www.exploit-db.com/exploits/41785/","source":"secure@symantec.com"},{"url":"https://www.exploit-db.com/exploits/41786/","source":"secure@symantec.com"},{"url":"http://www.securityfocus.com/bid/97372","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","VDB Entry"]},{"url":"https://bto.bluecoat.com/security-advisory/sa138","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mitigation","Vendor Advisory"]},{"url":"https://www.exploit-db.com/exploits/41785/","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://www.exploit-db.com/exploits/41786/","source":"af854a3a-2127-422b-91ae-364da2661108"}]}}]}