{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2023-3016","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2023-05-31T13:04:16.550Z","datePublished":"2023-05-31T14:00:05.898Z","dateUpdated":"2024-08-02T06:41:04.189Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2024-02-13T07:35:15.084Z"},"title":"yiwent Vip Video Analysis admincore.php cross site scripting","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-79","lang":"en","description":"CWE-79 Cross Site Scripting"}]}],"affected":[{"vendor":"yiwent","product":"Vip Video Analysis","versions":[{"version":"1.0","status":"affected"}]}],"descriptions":[{"lang":"en","value":"A vulnerability was found in yiwent Vip Video Analysis 1.0 and classified as problematic. Affected by this issue is some unknown functionality of the file admin/admincore.php. The manipulation leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-230360."},{"lang":"de","value":"Eine Schwachstelle wurde in yiwent Vip Video Analysis 1.0 gefunden. Sie wurde als problematisch eingestuft. Davon betroffen ist unbekannter Code der Datei admin/admincore.php. Durch das Beeinflussen mit unbekannten Daten kann eine cross site scripting-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk erfolgen. Der Exploit steht zur öffentlichen Verfügung."}],"metrics":[{"cvssV3_1":{"version":"3.1","baseScore":3.5,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N","baseSeverity":"LOW"}},{"cvssV3_0":{"version":"3.0","baseScore":3.5,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N","baseSeverity":"LOW"}},{"cvssV2_0":{"version":"2.0","baseScore":4,"vectorString":"AV:N/AC:L/Au:S/C:N/I:P/A:N"}}],"timeline":[{"time":"2023-05-31T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2023-05-31T00:00:00.000Z","lang":"en","value":"CVE reserved"},{"time":"2023-05-31T02:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2023-06-25T08:56:36.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"webray.com.cn (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.230360","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.230360","tags":["signature","permissions-required"]},{"url":"https://github.com/Xor-Gerke/webray.com.cn/blob/main/cve/VIP-video-analysis/XSS.md","tags":["broken-link","exploit"]}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T06:41:04.189Z"},"title":"CVE Program Container","references":[{"url":"https://vuldb.com/?id.230360","tags":["vdb-entry","technical-description","x_transferred"]},{"url":"https://vuldb.com/?ctiid.230360","tags":["signature","permissions-required","x_transferred"]},{"url":"https://github.com/Xor-Gerke/webray.com.cn/blob/main/cve/VIP-video-analysis/XSS.md","tags":["broken-link","exploit","x_transferred"]}]}]}}