CVE-2008-3186

Chipmunk Blog - XSS

Title source: llm
STIX 2.1

Description

Multiple cross-site scripting (XSS) vulnerabilities in Chipmunk Blog (Blogger) allow remote attackers to inject arbitrary web script or HTML via the membername parameter to (1) members.php, (2) comments.php, (3) photos.php, (4) archive.php, or (5) cat.php. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.

Exploits (5)

exploitdb WRITEUP VERIFIED
by sl4xUz · textwebappsphp
https://www.exploit-db.com/exploits/31951
exploitdb WRITEUP VERIFIED
by sl4xUz · textwebappsphp
https://www.exploit-db.com/exploits/31949
exploitdb WRITEUP VERIFIED
by sl4xUz · textwebappsphp
https://www.exploit-db.com/exploits/31950
exploitdb WRITEUP VERIFIED
by sl4xUz · textwebappsphp
https://www.exploit-db.com/exploits/31953
exploitdb WRITEUP VERIFIED
by sl4xUz · textwebappsphp
https://www.exploit-db.com/exploits/31952

References (2)

Core 2
Core References
Third Party Advisory, VDB Entry vdb-entry x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/43319
Third Party Advisory, VDB Entry vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/29883

Scores

EPSS 0.0025
EPSS Percentile 48.7%

Details

CWE
CWE-79
Status published
Products (1)
chipmunk_scripts/chipmunk_blogger
Published Jul 15, 2008
Tracked Since Feb 18, 2026