exploitdb
WRITEUP
VERIFIED
by sl4xUz · textwebappsphp
https://www.exploit-db.com/exploits/31952
The provided text describes a cross-site scripting (XSS) vulnerability in Chipmunk Blog, where user-supplied input via the 'membername' parameter in archive.php is not properly sanitized. It includes example URLs demonstrating the vulnerability but does not contain executable exploit code.
Classification
Writeup 90%
Target:
Chipmunk Blog (version not specified)
No auth needed
Prerequisites:
Access to the vulnerable web application
exploitdb
WRITEUP
VERIFIED
by sl4xUz · textwebappsphp
https://www.exploit-db.com/exploits/31953
The provided code is a writeup describing a cross-site scripting (XSS) vulnerability in Chipmunk Blog. It includes example URLs demonstrating how an attacker could inject arbitrary script code due to insufficient sanitization of user-supplied data.
Classification
Writeup 90%
Target:
Chipmunk Blog
No auth needed
Prerequisites:
Access to the vulnerable web application
exploitdb
WRITEUP
VERIFIED
by sl4xUz · textwebappsphp
https://www.exploit-db.com/exploits/31950
The provided text describes a cross-site scripting (XSS) vulnerability in Chipmunk Blog, where user-supplied input via the 'membername' parameter in comments.php is not properly sanitized. It includes example URLs demonstrating the vulnerability but does not contain executable exploit code.
Classification
Writeup 90%
Target:
Chipmunk Blog (version not specified)
No auth needed
Prerequisites:
Access to the vulnerable comments.php endpoint
exploitdb
WRITEUP
VERIFIED
by sl4xUz · textwebappsphp
https://www.exploit-db.com/exploits/31949
The provided text describes a cross-site scripting (XSS) vulnerability in Chipmunk Blog, where user-supplied input via the 'membername' parameter is not properly sanitized. It includes example URLs demonstrating the vulnerability but does not contain executable exploit code.
Classification
Writeup 90%
Target:
Chipmunk Blog (version not specified)
No auth needed
Prerequisites:
Access to the vulnerable web application
exploitdb
WRITEUP
VERIFIED
by sl4xUz · textwebappsphp
https://www.exploit-db.com/exploits/31951
The provided text describes a cross-site scripting (XSS) vulnerability in Chipmunk Blog, where user-supplied input via the 'membername' parameter in photos.php is not properly sanitized. It includes example URLs demonstrating the vulnerability but does not contain executable exploit code.
Classification
Writeup 90%
Target:
Chipmunk Blog (version not specified)
No auth needed
Prerequisites:
Access to the vulnerable photos.php endpoint