Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2012-6621

Опубликовано: 16 янв. 2014
Источник: nvd
CVSS2: 4.3
EPSS Низкий

Описание

Multiple cross-site scripting (XSS) vulnerabilities in GetSimple CMS 3.1, 3.1.2, 3.2.3, and earlier allow remote attackers to inject arbitrary web script or HTML via the (1) Email Address or (2) Custom Permalink Structure fields in admin/settings.php; (3) path parameter to admin/upload.php; (4) err parameter to admin/theme.php; (5) error parameter to admin/pages.php; or (6) success or (7) err parameter to admin/index.php.

Уязвимые конфигурации

Конфигурация 1

Одно из

cpe:2.3:a:get-simple:getsimple_cms:*:*:*:*:*:*:*:*
Версия до 3.2.3 (включая)
cpe:2.3:a:get-simple:getsimple_cms:1.0:*:*:*:*:*:*:*
cpe:2.3:a:get-simple:getsimple_cms:1.1:*:*:*:*:*:*:*
cpe:2.3:a:get-simple:getsimple_cms:1.2:*:*:*:*:*:*:*
cpe:2.3:a:get-simple:getsimple_cms:1.3:*:*:*:*:*:*:*
cpe:2.3:a:get-simple:getsimple_cms:1.4:*:*:*:*:*:*:*
cpe:2.3:a:get-simple:getsimple_cms:1.5:*:*:*:*:*:*:*
cpe:2.3:a:get-simple:getsimple_cms:1.6:*:*:*:*:*:*:*
cpe:2.3:a:get-simple:getsimple_cms:1.7:*:*:*:*:*:*:*
cpe:2.3:a:get-simple:getsimple_cms:1.25:*:*:*:*:*:*:*
cpe:2.3:a:get-simple:getsimple_cms:1.71:*:*:*:*:*:*:*
cpe:2.3:a:get-simple:getsimple_cms:2.0:*:*:*:*:*:*:*
cpe:2.3:a:get-simple:getsimple_cms:2.01:*:*:*:*:*:*:*
cpe:2.3:a:get-simple:getsimple_cms:2.03:*:*:*:*:*:*:*
cpe:2.3:a:get-simple:getsimple_cms:2.03.1:*:*:*:*:*:*:*
cpe:2.3:a:get-simple:getsimple_cms:3.0:*:*:*:*:*:*:*
cpe:2.3:a:get-simple:getsimple_cms:3.1:*:*:*:*:*:*:*
cpe:2.3:a:get-simple:getsimple_cms:3.1.1:*:*:*:*:*:*:*
cpe:2.3:a:get-simple:getsimple_cms:3.1.2:*:*:*:*:*:*:*
cpe:2.3:a:get-simple:getsimple_cms:3.2:*:*:*:*:*:*:*
cpe:2.3:a:get-simple:getsimple_cms:3.2.1:*:*:*:*:*:*:*
cpe:2.3:a:get-simple:getsimple_cms:3.2.2:*:*:*:*:*:*:*

EPSS

Процентиль: 64%
0.00475
Низкий

4.3 Medium

CVSS2

Дефекты

CWE-79

Связанные уязвимости

github
больше 3 лет назад

Multiple cross-site scripting (XSS) vulnerabilities in GetSimple CMS 3.1, 3.1.2, 3.2.3, and earlier allow remote attackers to inject arbitrary web script or HTML via the (1) Email Address or (2) Custom Permalink Structure fields in admin/settings.php; (3) path parameter to admin/upload.php; (4) err parameter to admin/theme.php; (5) error parameter to admin/pages.php; or (6) success or (7) err parameter to admin/index.php.

EPSS

Процентиль: 64%
0.00475
Низкий

4.3 Medium

CVSS2

Дефекты

CWE-79