Vulnerability Details : CVE-2012-0895
Potential exploit
Cross-site scripting (XSS) vulnerability in map/map.php in the Count Per Day module before 3.1.1 for WordPress allows remote attackers to inject arbitrary web script or HTML via the map parameter.
Vulnerability category: Cross site scripting (XSS)
Products affected by CVE-2012-0895
- cpe:2.3:a:tom_braider:count_per_day:*:*:*:*:*:*:*:*
- cpe:2.3:a:tom_braider:count_per_day:1.0:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2012-0895
0.90%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 83 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2012-0895
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.3
|
MEDIUM | AV:N/AC:M/Au:N/C:N/I:P/A:N |
8.6
|
2.9
|
NIST |
CWE ids for CVE-2012-0895
-
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.Assigned by: nvd@nist.gov (Primary)
References for CVE-2012-0895
-
http://www.securityfocus.com/bid/51402
WordPress Count per Day Plugin Arbitrary File Download and Cross Site Scripting VulnerabilitiesExploit
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/72384
Count per Day plugin for WordPress map.php cross-site scripting CVE-2012-0895 Vulnerability Report
-
http://plugins.trac.wordpress.org/changeset/488883/count-per-day
Changeset 488883 for count-per-day – WordPress Plugin Repository
-
http://www.exploit-db.com/exploits/18355
WordPress Plugin Count Per Day - Multiple Vulnerabilities - PHP webapps ExploitExploit
-
http://wordpress.org/extend/plugins/count-per-day/changelog/
Count per Day – WordPress plugin | WordPress.org
-
http://packetstormsecurity.org/files/108631/countperday-downloadxss.txt
WordPress Count-Per-Day File Download / Cross Site Scripting ≈ Packet StormExploit
Jump to