{"containers":{"cna":{"affected":[{"product":"PricePoint","vendor":"Navetti","versions":[{"status":"affected","version":"4.6.0.0"}]}],"credits":[{"lang":"en","value":"W. Schober"}],"descriptions":[{"lang":"en","value":"A vulnerability was found in Navetti PricePoint 4.6.0.0. It has been classified as problematic. This affects an unknown part. The manipulation leads to basic cross site scripting (Reflected). It is possible to initiate the attack remotely. Upgrading to version 4.7.0.0 is able to address this issue. It is recommended to upgrade the affected component."}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":4.3,"baseSeverity":"MEDIUM","confidentialityImpact":"NONE","integrityImpact":"LOW","privilegesRequired":"LOW","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N","version":"3.1"}}],"problemTypes":[{"descriptions":[{"cweId":"CWE-80","description":"CWE-80 Basic Cross Site Scripting","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2022-06-13T06:50:24.000Z","orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB"},"references":[{"tags":["x_refsource_MISC"],"url":"http://seclists.org/fulldisclosure/2017/Mar/24"},{"tags":["x_refsource_MISC"],"url":"https://vuldb.com/?id.97863"}],"title":"Navetti PricePoint Reflected cross site scriting","x_generator":"vuldb.com","x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"cna@vuldb.com","ID":"CVE-2017-20044","REQUESTER":"cna@vuldb.com","STATE":"PUBLIC","TITLE":"Navetti PricePoint Reflected cross site scriting"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"PricePoint","version":{"version_data":[{"version_value":"4.6.0.0"}]}}]},"vendor_name":"Navetti"}]}},"credit":"W. Schober","data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"A vulnerability was found in Navetti PricePoint 4.6.0.0. It has been classified as problematic. This affects an unknown part. The manipulation leads to basic cross site scripting (Reflected). It is possible to initiate the attack remotely. Upgrading to version 4.7.0.0 is able to address this issue. It is recommended to upgrade the affected component."}]},"generator":"vuldb.com","impact":{"cvss":{"baseScore":"4.3","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N","version":"3.1"}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-80 Basic Cross Site Scripting"}]}]},"references":{"reference_data":[{"name":"http://seclists.org/fulldisclosure/2017/Mar/24","refsource":"MISC","url":"http://seclists.org/fulldisclosure/2017/Mar/24"},{"name":"https://vuldb.com/?id.97863","refsource":"MISC","url":"https://vuldb.com/?id.97863"}]}}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-05T21:45:24.728Z"},"title":"CVE Program Container","references":[{"tags":["x_refsource_MISC","x_transferred"],"url":"http://seclists.org/fulldisclosure/2017/Mar/24"},{"tags":["x_refsource_MISC","x_transferred"],"url":"https://vuldb.com/?id.97863"}]},{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-04-14T17:11:30.856436Z","id":"CVE-2017-20044","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-04-15T14:25:33.679Z"}}]},"cveMetadata":{"assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","assignerShortName":"VulDB","cveId":"CVE-2017-20044","datePublished":"2022-06-13T06:50:24.000Z","dateReserved":"2022-06-06T00:00:00.000Z","dateUpdated":"2025-04-15T14:25:33.679Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}