Show plain JSON{"cve": {"data_type": "CVE", "references": {"reference_data": [{"url": "http://www.osvdb.org/83491", "name": "83491", "tags": ["Exploit"], "refsource": "OSVDB"}, {"url": "http://www.openwall.com/lists/oss-security/2012/07/27/2", "name": "[oss-security] 20120727 Re: CVE-request: WordPress plugin Count Per Day XSS (SSCHADV2012-015)", "tags": [], "refsource": "MLIST"}, {"url": "http://plugins.trac.wordpress.org/changeset/571926/count-per-day", "name": "http://plugins.trac.wordpress.org/changeset/571926/count-per-day", "tags": ["Exploit", "Patch"], "refsource": "CONFIRM"}, {"url": "http://www.tomsdimension.de/wp-plugins/count-per-day", "name": "http://www.tomsdimension.de/wp-plugins/count-per-day", "tags": [], "refsource": "CONFIRM"}, {"url": "http://secunia.com/advisories/49692", "name": "49692", "tags": ["Exploit", "Vendor Advisory"], "refsource": "SECUNIA"}, {"url": "http://www.darksecurity.de/advisories/2012/SSCHADV2012-015.txt", "name": "http://www.darksecurity.de/advisories/2012/SSCHADV2012-015.txt", "tags": ["Exploit"], "refsource": "MISC"}, {"url": "http://www.openwall.com/lists/oss-security/2012/07/24/4", "name": "[oss-security] 20120724 CVE-request: WordPress plugin Count Per Day XSS (SSCHADV2012-015)", "tags": [], "refsource": "MLIST"}]}, "data_format": "MITRE", "description": {"description_data": [{"lang": "en", "value": "Multiple cross-site scripting (XSS) vulnerabilities in userperspan.php in the Count Per Day module before 3.2 for WordPress allow remote attackers to inject arbitrary web script or HTML via the (1) page, (2) datemin, or (3) datemax parameter."}]}, "problemtype": {"problemtype_data": [{"description": [{"lang": "en", "value": "CWE-79"}]}]}, "data_version": "4.0", "CVE_data_meta": {"ID": "CVE-2012-3434", "ASSIGNER": "secalert@redhat.com"}}, "impact": {"baseMetricV2": {"cvssV2": {"version": "2.0", "baseScore": 4.3, "accessVector": "NETWORK", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "authentication": "NONE", "integrityImpact": "PARTIAL", "accessComplexity": "MEDIUM", "availabilityImpact": "NONE", "confidentialityImpact": "NONE"}, "severity": "MEDIUM", "impactScore": 2.9, "obtainAllPrivilege": false, "exploitabilityScore": 8.6, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": true}}, "publishedDate": "2012-08-15T21:55Z", "configurations": {"nodes": [{"children": [{"children": [], "operator": "OR", "cpe_match": [{"cpe23Uri": "cpe:2.3:a:tom_braider:count_per_day:1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:tom_braider:count_per_day:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true, "versionEndIncluding": "3.1"}]}, {"children": [], "operator": "OR", "cpe_match": [{"cpe23Uri": "cpe:2.3:a:wordpress:wordpress:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false}]}], "operator": "AND", "cpe_match": []}], "CVE_data_version": "4.0"}, "lastModifiedDate": "2020-07-13T10:51Z"}