Multiple cross-site scripting (XSS) vulnerabilities in userperspan.php in the Count Per Day module before 3.2 for WordPress allow remote attackers to inject arbitrary web script or HTML via the (1) page, (2) datemin, or (3) datemax parameter.
References
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 01:40
Type | Values Removed | Values Added |
---|---|---|
References | () http://plugins.trac.wordpress.org/changeset/571926/count-per-day - Exploit, Patch | |
References | () http://secunia.com/advisories/49692 - Exploit, Vendor Advisory | |
References | () http://www.darksecurity.de/advisories/2012/SSCHADV2012-015.txt - Exploit | |
References | () http://www.openwall.com/lists/oss-security/2012/07/24/4 - | |
References | () http://www.openwall.com/lists/oss-security/2012/07/27/2 - | |
References | () http://www.osvdb.org/83491 - Exploit | |
References | () http://www.tomsdimension.de/wp-plugins/count-per-day - |
Information
Published : 2012-08-15 21:55
Updated : 2024-11-21 01:40
NVD link : CVE-2012-3434
Mitre link : CVE-2012-3434
CVE.ORG link : CVE-2012-3434
JSON object : View
Products Affected
wordpress
- wordpress
tom_braider
- count_per_day
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')