Vulnerabilites related to mikejolley - download_monitor
Vulnerability from fkie_nvd
Published
2013-08-09 21:55
Modified
2025-04-11 00:51
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in admin/admin.php in the Download Monitor plugin before 3.3.6.2 for WordPress allows remote attackers to inject arbitrary web script or HTML via the p parameter.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
mikejolley | download_monitor | * | |
mikejolley | download_monitor | 1.0.0 | |
mikejolley | download_monitor | 1.0.1 | |
mikejolley | download_monitor | 1.0.2 | |
mikejolley | download_monitor | 1.0.3 | |
mikejolley | download_monitor | 1.0.4 | |
mikejolley | download_monitor | 1.0.5 | |
wordpress | wordpress | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mikejolley:download_monitor:*:*:*:*:*:wordpress:*:*", "matchCriteriaId": "B82BFD08-A7A4-4E1E-A2C6-60758016669D", "versionEndIncluding": "1.0.6", "vulnerable": true }, { "criteria": "cpe:2.3:a:mikejolley:download_monitor:1.0.0:*:*:*:*:wordpress:*:*", "matchCriteriaId": "D7254601-9A90-4E92-99EC-6B16DDA3A17D", "vulnerable": true }, { "criteria": "cpe:2.3:a:mikejolley:download_monitor:1.0.1:*:*:*:*:wordpress:*:*", "matchCriteriaId": "B6E1670B-FE1F-41B7-AE53-4EBFD3F3BFE7", "vulnerable": true }, { "criteria": "cpe:2.3:a:mikejolley:download_monitor:1.0.2:*:*:*:*:wordpress:*:*", "matchCriteriaId": "1433A499-1C31-49A8-9EB5-5377808ED204", "vulnerable": true }, { "criteria": "cpe:2.3:a:mikejolley:download_monitor:1.0.3:*:*:*:*:wordpress:*:*", "matchCriteriaId": "78094FD0-C6C7-4D40-8F65-D2D3FFD90C42", "vulnerable": true }, { "criteria": "cpe:2.3:a:mikejolley:download_monitor:1.0.4:*:*:*:*:wordpress:*:*", "matchCriteriaId": "71B161CD-1414-45AA-9DD2-DB64E78E3A53", "vulnerable": true }, { "criteria": "cpe:2.3:a:mikejolley:download_monitor:1.0.5:*:*:*:*:wordpress:*:*", "matchCriteriaId": "2D4733F7-2C89-476C-917B-9E9B5005F4D6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:a:wordpress:wordpress:-:*:*:*:*:*:*:*", "matchCriteriaId": "A77EB0E7-7FA7-4232-97DF-7C7587D163F1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in admin/admin.php in the Download Monitor plugin before 3.3.6.2 for WordPress allows remote attackers to inject arbitrary web script or HTML via the p parameter." }, { "lang": "es", "value": "Vulnerabilidad Cross-site scripting (XSS) en admin/admin.php en el plugin Download Monitor anterior a v3.3.6.2 para WordPress, permite a atacantes remotos inyectar secuencias de comandos web o HTML a trav\u00e9s del par\u00e1metro \u201cp\u201d." } ], "id": "CVE-2013-3262", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2013-08-09T21:55:06.953", "references": [ { "source": "PSIRT-CNA@flexerasoftware.com", "tags": [ "Exploit", "Patch" ], "url": "http://plugins.trac.wordpress.org/changeset/723187/download-monitor" }, { "source": "PSIRT-CNA@flexerasoftware.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/53116" }, { "source": "PSIRT-CNA@flexerasoftware.com", "url": "http://www.securityfocus.com/bid/61407" }, { "source": "PSIRT-CNA@flexerasoftware.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/85921" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch" ], "url": "http://plugins.trac.wordpress.org/changeset/723187/download-monitor" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/53116" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/61407" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/85921" } ], "sourceIdentifier": "PSIRT-CNA@flexerasoftware.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2013-08-09 21:55
Modified
2025-04-11 00:51
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in admin/admin.php in the Download Monitor plugin before 3.3.6.2 for WordPress allows remote attackers to inject arbitrary web script or HTML via the sort parameter, a different vulnerability than CVE-2013-3262.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
mikejolley | download_monitor | * | |
mikejolley | download_monitor | 1.0.0 | |
mikejolley | download_monitor | 1.0.1 | |
mikejolley | download_monitor | 1.0.2 | |
mikejolley | download_monitor | 1.0.3 | |
mikejolley | download_monitor | 1.0.4 | |
mikejolley | download_monitor | 1.0.5 | |
wordpress | wordpress | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mikejolley:download_monitor:*:*:*:*:*:wordpress:*:*", "matchCriteriaId": "B82BFD08-A7A4-4E1E-A2C6-60758016669D", "versionEndIncluding": "1.0.6", "vulnerable": true }, { "criteria": "cpe:2.3:a:mikejolley:download_monitor:1.0.0:*:*:*:*:wordpress:*:*", "matchCriteriaId": "D7254601-9A90-4E92-99EC-6B16DDA3A17D", "vulnerable": true }, { "criteria": "cpe:2.3:a:mikejolley:download_monitor:1.0.1:*:*:*:*:wordpress:*:*", "matchCriteriaId": "B6E1670B-FE1F-41B7-AE53-4EBFD3F3BFE7", "vulnerable": true }, { "criteria": "cpe:2.3:a:mikejolley:download_monitor:1.0.2:*:*:*:*:wordpress:*:*", "matchCriteriaId": "1433A499-1C31-49A8-9EB5-5377808ED204", "vulnerable": true }, { "criteria": "cpe:2.3:a:mikejolley:download_monitor:1.0.3:*:*:*:*:wordpress:*:*", "matchCriteriaId": "78094FD0-C6C7-4D40-8F65-D2D3FFD90C42", "vulnerable": true }, { "criteria": "cpe:2.3:a:mikejolley:download_monitor:1.0.4:*:*:*:*:wordpress:*:*", "matchCriteriaId": "71B161CD-1414-45AA-9DD2-DB64E78E3A53", "vulnerable": true }, { "criteria": "cpe:2.3:a:mikejolley:download_monitor:1.0.5:*:*:*:*:wordpress:*:*", "matchCriteriaId": "2D4733F7-2C89-476C-917B-9E9B5005F4D6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:a:wordpress:wordpress:-:*:*:*:*:*:*:*", "matchCriteriaId": "A77EB0E7-7FA7-4232-97DF-7C7587D163F1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in admin/admin.php in the Download Monitor plugin before 3.3.6.2 for WordPress allows remote attackers to inject arbitrary web script or HTML via the sort parameter, a different vulnerability than CVE-2013-3262." }, { "lang": "es", "value": "Vulnerabilidad Cross-site scripting (XSS) en admin/admin.php en el plugin Download Monitor anterior a v3.3.6.2 para WordPress, permite a atacantes remotos inyectar secuencias de comandos web o HTML a trav\u00e9s del par\u00e1metro \u201csort\u201d, una vulnerabilidad diferente de CVE-2013-3262." } ], "id": "CVE-2013-5098", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2013-08-09T21:55:07.300", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://plugins.trac.wordpress.org/changeset/723187/download-monitor" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/53116" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/61407" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/85921" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://plugins.trac.wordpress.org/changeset/723187/download-monitor" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/53116" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/61407" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/85921" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2014-09-04 14:55
Modified
2025-04-12 10:46
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in the Download Monitor plugin before 3.3.5.9 for WordPress allows remote attackers to inject arbitrary web script or HTML via the dlsearch parameter to the default URI.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
mikejolley | download_monitor | 3.3.5.7 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mikejolley:download_monitor:3.3.5.7:*:*:*:*:wordpress:*:*", "matchCriteriaId": "EB601D26-E697-427E-B8DD-42A03D69B68B", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in the Download Monitor plugin before 3.3.5.9 for WordPress allows remote attackers to inject arbitrary web script or HTML via the dlsearch parameter to the default URI." }, { "lang": "es", "value": "Vulnerabilidad de XSS en el plugin Download Monitor anterior a 3.3.5.9 para WordPress permite a atacantes remotos inyectar secuencias de comandos web o HTML arbitrarios a trav\u00e9s del par\u00e1metro dlsearch en la URI por defecto." } ], "id": "CVE-2012-4768", "lastModified": "2025-04-12T10:46:40.837", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2014-09-04T14:55:09.960", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2012-09/0042.html" }, { "source": "cve@mitre.org", "url": "http://osvdb.org/85319" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://packetstormsecurity.org/files/116408/wpdownloadmonitor3357-xss.txt" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/50511" }, { "source": "cve@mitre.org", "url": "http://www.reactionpenetrationtesting.co.uk/wordpress-download-monitor-xss.html" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78422" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2012-09/0042.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/85319" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://packetstormsecurity.org/files/116408/wpdownloadmonitor3357-xss.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/50511" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.reactionpenetrationtesting.co.uk/wordpress-download-monitor-xss.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78422" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
CVE-2013-3262 (GCVE-0-2013-3262)
Vulnerability from cvelistv5
Published
2013-08-09 21:00
Modified
2024-08-06 16:07
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Cross-site scripting (XSS) vulnerability in admin/admin.php in the Download Monitor plugin before 3.3.6.2 for WordPress allows remote attackers to inject arbitrary web script or HTML via the p parameter.
References
▼ | URL | Tags |
---|---|---|
http://plugins.trac.wordpress.org/changeset/723187/download-monitor | x_refsource_CONFIRM | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/85921 | vdb-entry, x_refsource_XF | |
http://secunia.com/advisories/53116 | third-party-advisory, x_refsource_SECUNIA | |
http://www.securityfocus.com/bid/61407 | vdb-entry, x_refsource_BID |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T16:07:36.661Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://plugins.trac.wordpress.org/changeset/723187/download-monitor" }, { "name": "wp-downloadmonitor-cve20133262-admin-xss(85921)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/85921" }, { "name": "53116", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/53116" }, { "name": "61407", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/61407" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2013-07-22T00:00:00", "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in admin/admin.php in the Download Monitor plugin before 3.3.6.2 for WordPress allows remote attackers to inject arbitrary web script or HTML via the p parameter." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-28T12:57:01", "orgId": "44d08088-2bea-4760-83a6-1e9be26b15ab", "shortName": "flexera" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://plugins.trac.wordpress.org/changeset/723187/download-monitor" }, { "name": "wp-downloadmonitor-cve20133262-admin-xss(85921)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/85921" }, { "name": "53116", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/53116" }, { "name": "61407", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/61407" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "PSIRT-CNA@flexerasoftware.com", "ID": "CVE-2013-3262", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cross-site scripting (XSS) vulnerability in admin/admin.php in the Download Monitor plugin before 3.3.6.2 for WordPress allows remote attackers to inject arbitrary web script or HTML via the p parameter." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://plugins.trac.wordpress.org/changeset/723187/download-monitor", "refsource": "CONFIRM", "url": "http://plugins.trac.wordpress.org/changeset/723187/download-monitor" }, { "name": "wp-downloadmonitor-cve20133262-admin-xss(85921)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/85921" }, { "name": "53116", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/53116" }, { "name": "61407", "refsource": "BID", "url": "http://www.securityfocus.com/bid/61407" } ] } } } }, "cveMetadata": { "assignerOrgId": "44d08088-2bea-4760-83a6-1e9be26b15ab", "assignerShortName": "flexera", "cveId": "CVE-2013-3262", "datePublished": "2013-08-09T21:00:00", "dateReserved": "2013-04-22T00:00:00", "dateUpdated": "2024-08-06T16:07:36.661Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2012-4768 (GCVE-0-2012-4768)
Vulnerability from cvelistv5
Published
2014-09-04 14:00
Modified
2024-08-06 20:42
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Cross-site scripting (XSS) vulnerability in the Download Monitor plugin before 3.3.5.9 for WordPress allows remote attackers to inject arbitrary web script or HTML via the dlsearch parameter to the default URI.
References
▼ | URL | Tags |
---|---|---|
http://secunia.com/advisories/50511 | third-party-advisory, x_refsource_SECUNIA | |
http://archives.neohapsis.com/archives/bugtraq/2012-09/0042.html | mailing-list, x_refsource_BUGTRAQ | |
http://www.reactionpenetrationtesting.co.uk/wordpress-download-monitor-xss.html | x_refsource_CONFIRM | |
http://osvdb.org/85319 | vdb-entry, x_refsource_OSVDB | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/78422 | vdb-entry, x_refsource_XF | |
http://packetstormsecurity.org/files/116408/wpdownloadmonitor3357-xss.txt | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T20:42:55.246Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "50511", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/50511" }, { "name": "20120909 Wordpress Download Monitor - Download Page Cross-Site Scripting", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2012-09/0042.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.reactionpenetrationtesting.co.uk/wordpress-download-monitor-xss.html" }, { "name": "85319", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/85319" }, { "name": "downloadmonitor-index-xss(78422)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78422" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.org/files/116408/wpdownloadmonitor3357-xss.txt" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2012-08-30T00:00:00", "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in the Download Monitor plugin before 3.3.5.9 for WordPress allows remote attackers to inject arbitrary web script or HTML via the dlsearch parameter to the default URI." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-28T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "50511", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/50511" }, { "name": "20120909 Wordpress Download Monitor - Download Page Cross-Site Scripting", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2012-09/0042.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.reactionpenetrationtesting.co.uk/wordpress-download-monitor-xss.html" }, { "name": "85319", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/85319" }, { "name": "downloadmonitor-index-xss(78422)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78422" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.org/files/116408/wpdownloadmonitor3357-xss.txt" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2012-4768", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cross-site scripting (XSS) vulnerability in the Download Monitor plugin before 3.3.5.9 for WordPress allows remote attackers to inject arbitrary web script or HTML via the dlsearch parameter to the default URI." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "50511", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/50511" }, { "name": "20120909 Wordpress Download Monitor - Download Page Cross-Site Scripting", "refsource": "BUGTRAQ", "url": "http://archives.neohapsis.com/archives/bugtraq/2012-09/0042.html" }, { "name": "http://www.reactionpenetrationtesting.co.uk/wordpress-download-monitor-xss.html", "refsource": "CONFIRM", "url": "http://www.reactionpenetrationtesting.co.uk/wordpress-download-monitor-xss.html" }, { "name": "85319", "refsource": "OSVDB", "url": "http://osvdb.org/85319" }, { "name": "downloadmonitor-index-xss(78422)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78422" }, { "name": "http://packetstormsecurity.org/files/116408/wpdownloadmonitor3357-xss.txt", "refsource": "MISC", "url": "http://packetstormsecurity.org/files/116408/wpdownloadmonitor3357-xss.txt" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2012-4768", "datePublished": "2014-09-04T14:00:00", "dateReserved": "2012-09-06T00:00:00", "dateUpdated": "2024-08-06T20:42:55.246Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2013-5098 (GCVE-0-2013-5098)
Vulnerability from cvelistv5
Published
2013-08-09 21:00
Modified
2024-08-06 16:59
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Cross-site scripting (XSS) vulnerability in admin/admin.php in the Download Monitor plugin before 3.3.6.2 for WordPress allows remote attackers to inject arbitrary web script or HTML via the sort parameter, a different vulnerability than CVE-2013-3262.
References
▼ | URL | Tags |
---|---|---|
http://plugins.trac.wordpress.org/changeset/723187/download-monitor | x_refsource_CONFIRM | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/85921 | vdb-entry, x_refsource_XF | |
http://secunia.com/advisories/53116 | third-party-advisory, x_refsource_SECUNIA | |
http://www.securityfocus.com/bid/61407 | vdb-entry, x_refsource_BID |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T16:59:41.297Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://plugins.trac.wordpress.org/changeset/723187/download-monitor" }, { "name": "wp-downloadmonitor-cve20133262-admin-xss(85921)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/85921" }, { "name": "53116", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/53116" }, { "name": "61407", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/61407" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2013-07-22T00:00:00", "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in admin/admin.php in the Download Monitor plugin before 3.3.6.2 for WordPress allows remote attackers to inject arbitrary web script or HTML via the sort parameter, a different vulnerability than CVE-2013-3262." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-28T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://plugins.trac.wordpress.org/changeset/723187/download-monitor" }, { "name": "wp-downloadmonitor-cve20133262-admin-xss(85921)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/85921" }, { "name": "53116", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/53116" }, { "name": "61407", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/61407" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2013-5098", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cross-site scripting (XSS) vulnerability in admin/admin.php in the Download Monitor plugin before 3.3.6.2 for WordPress allows remote attackers to inject arbitrary web script or HTML via the sort parameter, a different vulnerability than CVE-2013-3262." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://plugins.trac.wordpress.org/changeset/723187/download-monitor", "refsource": "CONFIRM", "url": "http://plugins.trac.wordpress.org/changeset/723187/download-monitor" }, { "name": "wp-downloadmonitor-cve20133262-admin-xss(85921)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/85921" }, { "name": "53116", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/53116" }, { "name": "61407", "refsource": "BID", "url": "http://www.securityfocus.com/bid/61407" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2013-5098", "datePublished": "2013-08-09T21:00:00", "dateReserved": "2013-08-09T00:00:00", "dateUpdated": "2024-08-06T16:59:41.297Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }