{"containers":{"cna":{"affected":[{"product":"n/a","vendor":"n/a","versions":[{"status":"affected","version":"n/a"}]}],"datePublic":"2012-08-30T00:00:00.000Z","descriptions":[{"lang":"en","value":"Cross-site scripting (XSS) vulnerability in the Download Monitor plugin before 3.3.5.9 for WordPress allows remote attackers to inject arbitrary web script or HTML via the dlsearch parameter to the default URI."}],"problemTypes":[{"descriptions":[{"description":"n/a","lang":"en","type":"text"}]}],"providerMetadata":{"dateUpdated":"2017-08-28T12:57:01.000Z","orgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","shortName":"mitre"},"references":[{"name":"50511","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/50511"},{"name":"20120909 Wordpress Download Monitor - Download Page Cross-Site Scripting","tags":["mailing-list","x_refsource_BUGTRAQ"],"url":"http://archives.neohapsis.com/archives/bugtraq/2012-09/0042.html"},{"tags":["x_refsource_CONFIRM"],"url":"http://www.reactionpenetrationtesting.co.uk/wordpress-download-monitor-xss.html"},{"name":"85319","tags":["vdb-entry","x_refsource_OSVDB"],"url":"http://osvdb.org/85319"},{"name":"downloadmonitor-index-xss(78422)","tags":["vdb-entry","x_refsource_XF"],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/78422"},{"tags":["x_refsource_MISC"],"url":"http://packetstormsecurity.org/files/116408/wpdownloadmonitor3357-xss.txt"}],"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"cve@mitre.org","ID":"CVE-2012-4768","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"Cross-site scripting (XSS) vulnerability in the Download Monitor plugin before 3.3.5.9 for WordPress allows remote attackers to inject arbitrary web script or HTML via the dlsearch parameter to the default URI."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"name":"50511","refsource":"SECUNIA","url":"http://secunia.com/advisories/50511"},{"name":"20120909 Wordpress Download Monitor - Download Page Cross-Site Scripting","refsource":"BUGTRAQ","url":"http://archives.neohapsis.com/archives/bugtraq/2012-09/0042.html"},{"name":"http://www.reactionpenetrationtesting.co.uk/wordpress-download-monitor-xss.html","refsource":"CONFIRM","url":"http://www.reactionpenetrationtesting.co.uk/wordpress-download-monitor-xss.html"},{"name":"85319","refsource":"OSVDB","url":"http://osvdb.org/85319"},{"name":"downloadmonitor-index-xss(78422)","refsource":"XF","url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/78422"},{"name":"http://packetstormsecurity.org/files/116408/wpdownloadmonitor3357-xss.txt","refsource":"MISC","url":"http://packetstormsecurity.org/files/116408/wpdownloadmonitor3357-xss.txt"}]}}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-06T20:42:55.246Z"},"title":"CVE Program Container","references":[{"name":"50511","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/50511"},{"name":"20120909 Wordpress Download Monitor - Download Page Cross-Site Scripting","tags":["mailing-list","x_refsource_BUGTRAQ","x_transferred"],"url":"http://archives.neohapsis.com/archives/bugtraq/2012-09/0042.html"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"http://www.reactionpenetrationtesting.co.uk/wordpress-download-monitor-xss.html"},{"name":"85319","tags":["vdb-entry","x_refsource_OSVDB","x_transferred"],"url":"http://osvdb.org/85319"},{"name":"downloadmonitor-index-xss(78422)","tags":["vdb-entry","x_refsource_XF","x_transferred"],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/78422"},{"tags":["x_refsource_MISC","x_transferred"],"url":"http://packetstormsecurity.org/files/116408/wpdownloadmonitor3357-xss.txt"}]}]},"cveMetadata":{"assignerOrgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","assignerShortName":"mitre","cveId":"CVE-2012-4768","datePublished":"2014-09-04T14:00:00.000Z","dateReserved":"2012-09-06T00:00:00.000Z","dateUpdated":"2024-08-06T20:42:55.246Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}