Files
cve/2012/CVE-2012-4768.md

19 lines
778 B
Markdown
Raw Normal View History

2024-05-26 14:27:05 +02:00
### [CVE-2012-4768](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4768)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
2025-09-29 21:09:30 +02:00
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brightgreen)
2024-05-26 14:27:05 +02:00
### Description
Cross-site scripting (XSS) vulnerability in the Download Monitor plugin before 3.3.5.9 for WordPress allows remote attackers to inject arbitrary web script or HTML via the dlsearch parameter to the default URI.
### POC
#### Reference
- http://packetstormsecurity.org/files/116408/wpdownloadmonitor3357-xss.txt
#### Github
2025-09-29 21:09:30 +02:00
- https://github.com/20142995/nuclei-templates
2024-05-26 14:27:05 +02:00
- https://github.com/ARPSyndicate/kenzer-templates