{"containers":{"cna":{"affected":[{"product":"PricePoint","vendor":"Navetti","versions":[{"status":"affected","version":"4.6.0.0"}]}],"credits":[{"lang":"en","value":"W. Schober"}],"descriptions":[{"lang":"en","value":"A vulnerability was found in Navetti PricePoint 4.6.0.0 and classified as problematic. Affected by this issue is some unknown functionality. The manipulation leads to basic cross site scripting (Persistent). The attack may be launched remotely. Upgrading to version 4.7.0.0 is able to address this issue. It is recommended to upgrade the affected component."}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":4.3,"baseSeverity":"MEDIUM","confidentialityImpact":"NONE","integrityImpact":"LOW","privilegesRequired":"LOW","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N","version":"3.1"}}],"problemTypes":[{"descriptions":[{"cweId":"CWE-80","description":"CWE-80 Basic Cross Site Scripting","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2022-06-13T06:50:22.000Z","orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB"},"references":[{"tags":["x_refsource_MISC"],"url":"http://seclists.org/fulldisclosure/2017/Mar/24"},{"tags":["x_refsource_MISC"],"url":"https://vuldb.com/?id.97862"}],"title":"Navetti PricePoint Persistent cross site scriting","x_generator":"vuldb.com","x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"cna@vuldb.com","ID":"CVE-2017-20043","REQUESTER":"cna@vuldb.com","STATE":"PUBLIC","TITLE":"Navetti PricePoint Persistent cross site scriting"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"PricePoint","version":{"version_data":[{"version_value":"4.6.0.0"}]}}]},"vendor_name":"Navetti"}]}},"credit":"W. Schober","data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"A vulnerability was found in Navetti PricePoint 4.6.0.0 and classified as problematic. Affected by this issue is some unknown functionality. The manipulation leads to basic cross site scripting (Persistent). The attack may be launched remotely. Upgrading to version 4.7.0.0 is able to address this issue. It is recommended to upgrade the affected component."}]},"generator":"vuldb.com","impact":{"cvss":{"baseScore":"4.3","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N","version":"3.1"}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-80 Basic Cross Site Scripting"}]}]},"references":{"reference_data":[{"name":"http://seclists.org/fulldisclosure/2017/Mar/24","refsource":"MISC","url":"http://seclists.org/fulldisclosure/2017/Mar/24"},{"name":"https://vuldb.com/?id.97862","refsource":"MISC","url":"https://vuldb.com/?id.97862"}]}}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-05T21:45:25.466Z"},"title":"CVE Program Container","references":[{"tags":["x_refsource_MISC","x_transferred"],"url":"http://seclists.org/fulldisclosure/2017/Mar/24"},{"tags":["x_refsource_MISC","x_transferred"],"url":"https://vuldb.com/?id.97862"}]},{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-04-14T17:11:35.553397Z","id":"CVE-2017-20043","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-04-15T14:25:40.842Z"}}]},"cveMetadata":{"assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","assignerShortName":"VulDB","cveId":"CVE-2017-20043","datePublished":"2022-06-13T06:50:23.000Z","dateReserved":"2022-06-06T00:00:00.000Z","dateUpdated":"2025-04-15T14:25:40.842Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}