{ "schema_version": "1.4.0", "id": "GHSA-r6wq-vrxj-qwhf", "modified": "2022-05-01T23:58:48Z", "published": "2022-05-01T23:58:48Z", "aliases": [ "CVE-2008-3301" ], "details": "Multiple cross-site scripting (XSS) vulnerabilities in BilboBlog 0.2.1 allow remote authenticated administrators to inject arbitrary web script or HTML via the (1) content parameter to admin/update.php, related to conflicting code in widget.php; and allow remote attackers to inject arbitrary web script or HTML via the (2) titleId parameter to head.php, reachable through index.php; the (3) t_lang[lang_copyright] parameter to footer.php; the (4) content parameter to the default URI under admin/; the (5) url, (6) t_lang[lang_admin_help], (7) t_lang[lang_admin_clear_cache], (8) t_lang[lang_admin_home], and (9) t_lang[lang_admin_logout] parameters to admin/homelink.php; and the (10) t_lang[lang_admin_new_post] parameter to admin/post.php. NOTE: some of these details are obtained from third party information.", "severity": [], "affected": [], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-3301" }, { "type": "WEB", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43764" }, { "type": "WEB", "url": "https://www.exploit-db.com/exploits/6073" }, { "type": "WEB", "url": "http://secunia.com/advisories/31054" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/30228" } ], "database_specific": { "cwe_ids": [ "CWE-79" ], "severity": "LOW", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2008-07-25T13:41:00Z" } }