{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2023-6616","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2023-12-08T09:54:27.116Z","datePublished":"2023-12-08T16:31:05.055Z","dateUpdated":"2024-08-02T08:35:14.824Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2023-12-08T16:31:05.055Z"},"title":"SourceCodester Simple Student Attendance System index.php cross site scripting","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-79","lang":"en","description":"CWE-79 Cross Site Scripting"}]}],"affected":[{"vendor":"SourceCodester","product":"Simple Student Attendance System","versions":[{"version":"1.0","status":"affected"}]}],"descriptions":[{"lang":"en","value":"A vulnerability was found in SourceCodester Simple Student Attendance System 1.0 and classified as problematic. This issue affects some unknown processing of the file index.php. The manipulation of the argument page leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-247253 was assigned to this vulnerability."},{"lang":"de","value":"Eine problematische Schwachstelle wurde in SourceCodester Simple Student Attendance System 1.0 gefunden. Betroffen davon ist ein unbekannter Prozess der Datei index.php. Mittels Manipulieren des Arguments page mit unbekannten Daten kann eine cross site scripting-Schwachstelle ausgenutzt werden. Die Umsetzung des Angriffs kann dabei über das Netzwerk erfolgen. Der Exploit steht zur öffentlichen Verfügung."}],"metrics":[{"cvssV3_1":{"version":"3.1","baseScore":3.5,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N","baseSeverity":"LOW"}},{"cvssV3_0":{"version":"3.0","baseScore":3.5,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N","baseSeverity":"LOW"}},{"cvssV2_0":{"version":"2.0","baseScore":4,"vectorString":"AV:N/AC:L/Au:S/C:N/I:P/A:N"}}],"timeline":[{"time":"2023-12-08T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2023-12-08T01:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2023-12-08T10:59:44.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"whs123 (VulDB User)","type":"analyst"}],"references":[{"url":"https://vuldb.com/?id.247253","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.247253","tags":["signature","permissions-required"]},{"url":"https://www.yuque.com/u39339523/el4dxs/sxa6f9gywg6vfbur","tags":["exploit"]}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T08:35:14.824Z"},"title":"CVE Program Container","references":[{"url":"https://vuldb.com/?id.247253","tags":["vdb-entry","technical-description","x_transferred"]},{"url":"https://vuldb.com/?ctiid.247253","tags":["signature","permissions-required","x_transferred"]},{"url":"https://www.yuque.com/u39339523/el4dxs/sxa6f9gywg6vfbur","tags":["exploit","x_transferred"]}]}]}}