CVSS Base Vector: AV:N/AC:M/Au:S/C:N/I:P/A:N
Detection Type: Remote Banner
Solution Type: None Available
Summary: GetSimple CMS is prone to a stored cross-site scripting (XSS) vulnerability.
Detection Method: Checks if a vulnerable version is present on the target host.
Technical Details: The vulnerability is exploitable via admin/theme-edit.php.
Impact: Successful exploitation would allow an authenticated attacker to
Affected Versions: GetSimple CMS through version 3.3.15.
Recommendations: No known solution is available as of 19th September, 2019.
Information regarding this issue will be updated once solution details are available.
Web application abuses
Mageni can help you to find out if you have this or more vulnerabilities exposing you to hackers, ransomware and malware: Download Mageni's Free Edition
Debian Security Advisory DSA 4545-1 (mediawiki - security update)
Debian LTS Advisory ([SECURITY] [DLA 1966-1] aspell security update)
Debian LTS Advisory ([SECURITY] [DLA 1965-1] nfs-utils security update)
Apache HTTP Server Memory Access Vulnerability (Windows)
Apache HTTP Server Memory Access Vulnerability (Linux)
Apache HTTP Server Multiple Vulnerabilities (Windows)
Apache HTTP Server Multiple Vulnerabilities (Linux)
Apache HTTP Server Stack Overflow Vulnerability (Windows)
Apache HTTP Server Stack Overflow Vulnerability (Linux)
Mageni provides a free vulnerability scanning and management platform which helps you need to find, prioritize, remediate and manage your vulnerabilities.