CVE-2012-0895
Count per Day <= 3.1 - Cross-Site Scripting
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
5Exploited in Wild
-Decision
Descriptions
Cross-site scripting (XSS) vulnerability in map/map.php in the Count Per Day module before 3.1.1 for WordPress allows remote attackers to inject arbitrary web script or HTML via the map parameter.
Vulnerabilidad de ejecución de comandos en sitios cruzados (XSS) en el map/map.php en el módulo "Count Per Day" de Wordpress antes de su versión v3.1.1, permite a atacantes remotos inyectar secuencias de comandos web o HTML a través del parámetro 'map'.
The Count per Day plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the ‘map’ parameter in versions up to, and including, 3.1 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2012-01-12 First Exploit
- 2012-01-20 CVE Reserved
- 2012-01-20 CVE Published
- 2024-02-08 EPSS Updated
- 2024-08-06 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CAPEC
References (9)
URL | Tag | Source |
---|---|---|
http://plugins.trac.wordpress.org/changeset/488883/count-per-day | X_refsource_confirm | |
http://wordpress.org/extend/plugins/count-per-day/changelog | X_refsource_confirm | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/72384 | Vdb Entry |
URL | Date | SRC |
---|---|---|
https://www.exploit-db.com/exploits/18355 | 2012-01-12 | |
http://osvdb.org/78271 | 2024-08-06 | |
http://packetstormsecurity.org/files/108631/countperday-downloadxss.txt | 2024-08-06 | |
http://www.exploit-db.com/exploits/18355 | 2024-08-06 | |
http://www.securityfocus.com/bid/51402 | 2024-08-06 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://secunia.com/advisories/47529 | 2020-07-13 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Tom Braider Search vendor "Tom Braider" | Count Per Day Search vendor "Tom Braider" for product "Count Per Day" | <= 3.1 Search vendor "Tom Braider" for product "Count Per Day" and version " <= 3.1" | - |
Affected
| in | Wordpress Search vendor "Wordpress" | Wordpress Search vendor "Wordpress" for product "Wordpress" | * | - |
Safe
|
Tom Braider Search vendor "Tom Braider" | Count Per Day Search vendor "Tom Braider" for product "Count Per Day" | 1.0 Search vendor "Tom Braider" for product "Count Per Day" and version "1.0" | - |
Affected
| in | Wordpress Search vendor "Wordpress" | Wordpress Search vendor "Wordpress" for product "Wordpress" | * | - |
Safe
|