CVE-2006-3607

Softbiz Banner Exchange - XSS

Title source: rule
STIX 2.1

Description

Multiple cross-site scripting (XSS) vulnerabilities in Softbiz Banner Exchange Script (aka Banner Exchange Network Script) 1.0 allow remote attackers to inject arbitrary web script or HTML via (1) the city parameter in (a) insertmember.php, and (2) a PHPSESSID cookie in (b) lostpassword.php, (c) gen_confirm_mem.php, and (d) index.php.

Exploits (4)

exploitdb WORKING POC VERIFIED
by securityconnection · textwebappsphp
https://www.exploit-db.com/exploits/28138
exploitdb WORKING POC VERIFIED
by securityconnection · textwebappsphp
https://www.exploit-db.com/exploits/28137
exploitdb WORKING POC VERIFIED
by securityconnection · textwebappsphp
https://www.exploit-db.com/exploits/28140
exploitdb WORKING POC VERIFIED
by securityconnection · textwebappsphp
https://www.exploit-db.com/exploits/28139

References (5)

Core 5
Core References
Exploit, URL Repurposed x_refsource_misc
http://ellsec.org/print.php?type=N&item_id=141
Exploit vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/18735
Third Party Advisory, VDB Entry mailing-list x_refsource_bugtraq
http://www.securityfocus.com/archive/1/438705/100/200/threaded
Third Party Advisory, VDB Entry vdb-entry x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/27461
Third Party Advisory, VDB Entry vdb-entry x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/27460

Scores

EPSS 0.0044
EPSS Percentile 63.0%

Details

Status published
Products (2)
softbiz/banner_exchange 1.0
softbizscripts/banner_exchange_script 1.0
Published Jul 18, 2006
Tracked Since Feb 18, 2026