{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-25T10:34:20.430","vulnerabilities":[{"cve":{"id":"CVE-2017-5247","sourceIdentifier":"cve@rapid7.com","published":"2017-07-18T18:29:00.263","lastModified":"2025-04-20T01:37:25.860","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"Biscom Secure File Transfer is vulnerable to cross-site scripting in the File Name field. An authenticated user with permissions to upload or send files can populate this field with a filename that contains standard HTML scripting tags. The resulting script will evaluated by any other authenticated user who views the attacker-supplied file name. All versions of SFT prior to 5.1.1028 are affected. The fix version is 5.1.1028."},{"lang":"es","value":"Biscom Secure File Transfer es vulnerable a las  cross-site scripting  en el campo Nombre de archivo. Un usuario autenticado con permisos para cargar o enviar archivos puede llenar este campo con un nombre de archivo que contiene etiquetas de secuencias de comandos HTML estándar. El script resultante será evaluado por cualquier otro usuario autenticado que vea el nombre del archivo proporcionado por el atacante. Todas las versiones de SFT anteriores a la versión 5.1.1028 se ven afectadas. La versión de reparación es 5.1.1028."}],"metrics":{"cvssMetricV30":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N","baseScore":5.4,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":2.3,"impactScore":2.7}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:S/C:N/I:P/A:N","baseScore":3.5,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"SINGLE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"LOW","exploitabilityScore":6.8,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-79"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:biscom:secure_file_transfer:-:*:*:*:*:*:*:*","matchCriteriaId":"EFA39957-D9D2-41F6-BAC4-B6DCE183BC69"}]}]}],"references":[{"url":"https://cve.biscom.com/bis-sft-cv-0005/","source":"cve@rapid7.com"},{"url":"https://twitter.com/i_bo0om/status/885050741567750145","source":"cve@rapid7.com","tags":["Third Party Advisory"]},{"url":"https://cve.biscom.com/bis-sft-cv-0005/","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://twitter.com/i_bo0om/status/885050741567750145","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]}]}}]}