{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-10T10:05:34.266","vulnerabilities":[{"cve":{"id":"CVE-2020-5737","sourceIdentifier":"vulnreport@tenable.com","published":"2020-04-17T19:15:15.170","lastModified":"2024-11-21T05:34:30.617","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Stored XSS in Tenable.Sc before 5.14.0 could allow an authenticated remote attacker to craft a request to execute arbitrary script code in a user's browser session. Updated input validation techniques have been implemented to correct this issue."},{"lang":"es","value":"Una Vulnerabilidad de tipo XSS almacenado en Tenable.Sc versiones anteriores a 5.14.0, podría permitir a un atacante remoto autentificado diseñar una petición para ejecutar un código script arbitrario en una sesión del navegador de un usuario. Se han implementado técnicas actualizadas de comprobación de entrada para corregir este problema."}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N","baseScore":5.4,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":2.3,"impactScore":2.7}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:S/C:N/I:P/A:N","baseScore":3.5,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"SINGLE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"LOW","exploitabilityScore":6.8,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-79"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:tenable:tenable.sc:5.14.0:*:*:*:*:*:*:*","matchCriteriaId":"AEC4349D-D138-4EB5-AA72-616988F63DE2"},{"vulnerable":true,"criteria":"cpe:2.3:a:tenable:tenable.sc:5.14.1:*:*:*:*:*:*:*","matchCriteriaId":"2E49ABD5-084F-4CA5-8641-73C49C6A0DE3"}]}]}],"references":[{"url":"https://www.tenable.com/security/tns-2020-02","source":"vulnreport@tenable.com","tags":["Patch","Vendor Advisory"]},{"url":"https://www.tenable.com/security/tns-2020-02","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]}]}}]}