CVE-2012-3434
Summary
| CVE | CVE-2012-3434 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2012-08-15 21:55:00 UTC |
| Updated | 2020-07-13 10:51:00 UTC |
| Description | Multiple cross-site scripting (XSS) vulnerabilities in userperspan.php in the Count Per Day module before 3.2 for WordPress allow remote attackers to inject arbitrary web script or HTML via the (1) page, (2) datemin, or (3) datemax parameter. |
Risk And Classification
Problem Types: CWE-79
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Tom Braider | Count Per Day | 1.0 | All | All | All |
| Application | Tom Braider | Count Per Day | 1.0 | All | All | All |
| Application | Tom Braider | Count Per Day | All | All | All | All |
| Application | Wordpress | Wordpress | - | All | All | All |
| Application | Wordpress | Wordpress | - | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| www.darksecurity.de/advisories/2012/SSCHADV2012-015.txt | MISC | www.darksecurity.de | Exploit |
| oss-security - Re: CVE-request: WordPress plugin Count Per Day XSS (SSCHADV2012-015) | MLIST | www.openwall.com | |
| 403 Forbidden | CONFIRM | plugins.trac.wordpress.org | Exploit, Patch |
| Count per Day : Toms Dimension | CONFIRM | www.tomsdimension.de | |
| oss-security - CVE-request: WordPress plugin Count Per Day XSS (SSCHADV2012-015) | MLIST | www.openwall.com | |
| 83491 | OSVDB | www.osvdb.org | Exploit |
| Security Alerts - Secunia | SECUNIA | secunia.com | Exploit, Vendor Advisory |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.