Description
Multiple cross-site scripting (XSS) vulnerabilities in Softbiz Banner Exchange Script (aka Banner Exchange Network Script) 1.0 allow remote attackers to inject arbitrary web script or HTML via (1) the city parameter in (a) insertmember.php, and (2) a PHPSESSID cookie in (b) lostpassword.php, (c) gen_confirm_mem.php, and (d) index.php.
Exploits (4)
exploitdb
WORKING POC
VERIFIED
by securityconnection · textwebappsphp
https://www.exploit-db.com/exploits/28138
exploitdb
WORKING POC
VERIFIED
by securityconnection · textwebappsphp
https://www.exploit-db.com/exploits/28137
exploitdb
WORKING POC
VERIFIED
by securityconnection · textwebappsphp
https://www.exploit-db.com/exploits/28140
exploitdb
WORKING POC
VERIFIED
by securityconnection · textwebappsphp
https://www.exploit-db.com/exploits/28139
References (5)
Core 5
Core References
Exploit, URL Repurposed x_refsource_misc
http://ellsec.org/print.php?type=N&item_id=141
Exploit vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/18735
Third Party Advisory, VDB Entry mailing-list
x_refsource_bugtraq
http://www.securityfocus.com/archive/1/438705/100/200/threaded
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/27461
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/27460
Scores
EPSS
0.0044
EPSS Percentile
63.0%
Details
Status
published
Products (2)
softbiz/banner_exchange
1.0
softbizscripts/banner_exchange_script
1.0
Published
Jul 18, 2006
Tracked Since
Feb 18, 2026