exploitdb
WORKING POC
VERIFIED
by HACKERS PAL · textwebappsphp
https://www.exploit-db.com/exploits/28617
The exploit demonstrates a reflected XSS vulnerability in Grayscale BandSite CMS by injecting a JavaScript payload via the 'the_band' parameter in the help_news.php file. The payload executes arbitrary script code in the context of the user's browser, potentially stealing cookie-based authentication credentials.
Classification
Working Poc 90%
Target:
Grayscale BandSite CMS 1.1.0
No auth needed
Prerequisites:
Access to the vulnerable URL parameter
exploitdb
WRITEUP
VERIFIED
by HACKERS PAL · textwebappsphp
https://www.exploit-db.com/exploits/28625
The provided text describes a reflected XSS vulnerability in Grayscale BandSite CMS version 1.1.0, where unsanitized user input in the 'the_band' parameter allows arbitrary JavaScript execution. The example demonstrates a basic alert-based payload to steal cookies.
Classification
Writeup 90%
Target:
Grayscale BandSite CMS 1.1.0
No auth needed
Prerequisites:
Access to the vulnerable endpoint
exploitdb
WORKING POC
VERIFIED
by HACKERS PAL · textwebappsphp
https://www.exploit-db.com/exploits/28628
The exploit demonstrates a reflected XSS vulnerability in Grayscale BandSite CMS by injecting a JavaScript payload via the 'the_band' parameter in member_content.php. It leverages insufficient input sanitization to execute arbitrary script code in the context of the affected site.
Classification
Working Poc 90%
Target:
Grayscale BandSite CMS 1.1.0
No auth needed
Prerequisites:
Access to the vulnerable endpoint
exploitdb
WRITEUP
VERIFIED
by HACKERS PAL · textwebappsphp
https://www.exploit-db.com/exploits/28637
The provided text describes a reflected XSS vulnerability in Grayscale BandSite CMS version 1.1.0, where user-supplied input via the 'the_band' parameter is not properly sanitized. The example demonstrates a basic XSS payload that executes arbitrary JavaScript in the context of the affected site.
Classification
Writeup 90%
Target:
Grayscale BandSite CMS 1.1.0
No auth needed
Prerequisites:
Access to the vulnerable endpoint
exploitdb
WORKING POC
VERIFIED
by HACKERS PAL · textwebappsphp
https://www.exploit-db.com/exploits/28618
This exploit demonstrates a reflected XSS vulnerability in Grayscale BandSite CMS by injecting a JavaScript payload via the 'the_band' parameter in the help_merch.php file. The vulnerability allows arbitrary script execution in the context of the affected site.
Classification
Working Poc 90%
Target:
Grayscale BandSite CMS 1.1.0
No auth needed
Prerequisites:
Access to the vulnerable URL
exploitdb
WORKING POC
VERIFIED
by HACKERS PAL · textwebappsphp
https://www.exploit-db.com/exploits/28638
This exploit demonstrates a reflected XSS vulnerability in Grayscale BandSite CMS by injecting a JavaScript payload into the 'this_year' parameter of the footer.php file. The vulnerability arises due to insufficient input sanitization, allowing arbitrary script execution in the context of the affected site.
Classification
Working Poc 90%
Target:
Grayscale BandSite CMS 1.1.0
No auth needed
Prerequisites:
Access to the vulnerable endpoint
exploitdb
WORKING POC
VERIFIED
by HACKERS PAL · textwebappsphp
https://www.exploit-db.com/exploits/28621
This exploit demonstrates a reflected XSS vulnerability in Grayscale BandSite CMS by injecting a malicious script via the 'the_band' parameter in the admin panel's header.php file. The PoC uses a simple alert to display the user's cookies, proving the vulnerability.
Classification
Working Poc 90%
Target:
Grayscale BandSite CMS 1.1.0
No auth needed
Prerequisites:
Access to the vulnerable admin panel URL
exploitdb
WORKING POC
VERIFIED
by HACKERS PAL · textwebappsphp
https://www.exploit-db.com/exploits/28620
The exploit demonstrates a stored XSS vulnerability in Grayscale BandSite CMS by injecting a malicious script into the 'message_text' parameter of the mailing list functionality. This allows arbitrary JavaScript execution in the context of the affected site.
Classification
Working Poc 90%
Target:
Grayscale BandSite CMS 1.1.0
No auth needed
Prerequisites:
Access to the vulnerable endpoint
exploitdb
WRITEUP
VERIFIED
by HACKERS PAL · textwebappsphp
https://www.exploit-db.com/exploits/28624
The provided text describes a reflected XSS vulnerability in Grayscale BandSite CMS version 1.1.0, where user-supplied input in the 'the_band' parameter is not properly sanitized, allowing arbitrary JavaScript execution. The example demonstrates a simple alert-based payload to confirm the vulnerability.
Classification
Writeup 90%
Target:
Grayscale BandSite CMS 1.1.0
No auth needed
Prerequisites:
Access to the vulnerable endpoint
exploitdb
WORKING POC
VERIFIED
by HACKERS PAL · textwebappsphp
https://www.exploit-db.com/exploits/28630
This exploit demonstrates a reflected XSS vulnerability in Grayscale BandSite CMS 1.1.0 by injecting a JavaScript payload via the 'the_band' parameter in mp3_content.php. The payload executes arbitrary script code in the context of the affected site.
Classification
Working Poc 90%
Target:
Grayscale BandSite CMS 1.1.0
No auth needed
Prerequisites:
Access to the vulnerable endpoint
exploitdb
WRITEUP
VERIFIED
by HACKERS PAL · textwebappsphp
https://www.exploit-db.com/exploits/28635
The provided text describes a reflected XSS vulnerability in Grayscale BandSite CMS version 1.1.0, where user-supplied input in the 'the_band' parameter is not properly sanitized. The example demonstrates a basic XSS payload that executes arbitrary JavaScript in the context of the affected site.
Classification
Writeup 90%
Target:
Grayscale BandSite CMS 1.1.0
No auth needed
Prerequisites:
Access to the vulnerable endpoint
exploitdb
WORKING POC
VERIFIED
by HACKERS PAL · textwebappsphp
https://www.exploit-db.com/exploits/28636
This exploit demonstrates a reflected XSS vulnerability in Grayscale BandSite CMS by injecting a JavaScript payload via the 'the_band' parameter in 'shows_content.php'. The payload executes arbitrary script code in the context of the affected site, potentially stealing cookie-based authentication credentials.
Classification
Working Poc 90%
Target:
Grayscale BandSite CMS 1.1.0
No auth needed
Prerequisites:
Access to the vulnerable endpoint
exploitdb
WORKING POC
VERIFIED
by HACKERS PAL · textwebappsphp
https://www.exploit-db.com/exploits/28619
This exploit demonstrates a reflected XSS vulnerability in Grayscale BandSite CMS by injecting a JavaScript payload via the 'max_file_size_purdy' parameter in the help_mp3.php file. The vulnerability allows arbitrary script execution in the context of the affected site.
Classification
Working Poc 90%
Target:
Grayscale BandSite CMS 1.1.0
No auth needed
Prerequisites:
Access to the vulnerable URL path
exploitdb
WORKING POC
VERIFIED
by HACKERS PAL · textwebappsphp
https://www.exploit-db.com/exploits/28622
This exploit demonstrates a reflected XSS vulnerability in Grayscale BandSite CMS 1.1.0 by injecting a malicious script into the 'the_band' parameter of login_header.php. The script executes in the context of the user's browser, potentially stealing cookie-based authentication credentials.
Classification
Working Poc 90%
Target:
Grayscale BandSite CMS 1.1.0
No auth needed
Prerequisites:
Access to the vulnerable web application
exploitdb
WRITEUP
VERIFIED
by HACKERS PAL · textwebappsphp
https://www.exploit-db.com/exploits/28633
The provided text describes a reflected XSS vulnerability in Grayscale BandSite CMS version 1.1.0, where user-supplied input in the 'the_band' parameter is not properly sanitized. The example demonstrates a basic XSS payload that executes arbitrary JavaScript in the context of the affected site.
Classification
Writeup 90%
Target:
Grayscale BandSite CMS 1.1.0
No auth needed
Prerequisites:
Access to the vulnerable URL parameter
exploitdb
WRITEUP
VERIFIED
by HACKERS PAL · textwebappsphp
https://www.exploit-db.com/exploits/28631
The provided text describes a cross-site scripting (XSS) vulnerability in Grayscale BandSite CMS version 1.1.0, where user-supplied input is not properly sanitized, allowing arbitrary script execution in the context of the affected site.
Classification
Writeup 90%
Target:
Grayscale BandSite CMS 1.1.0
No auth needed
Prerequisites:
Access to the vulnerable endpoint
exploitdb
WRITEUP
VERIFIED
by HACKERS PAL · textwebappsphp
https://www.exploit-db.com/exploits/28632
The provided text describes a reflected XSS vulnerability in Grayscale BandSite CMS version 1.1.0, where user-supplied input in the 'the_band' parameter is not properly sanitized, allowing arbitrary JavaScript execution.
Classification
Writeup 90%
Target:
Grayscale BandSite CMS 1.1.0
No auth needed
Prerequisites:
Access to the vulnerable endpoint
exploitdb
WRITEUP
VERIFIED
by HACKERS PAL · textwebappsphp
https://www.exploit-db.com/exploits/28634
The provided text describes a cross-site scripting (XSS) vulnerability in Grayscale BandSite CMS version 1.1.0, where user-supplied input is not properly sanitized, allowing arbitrary script execution in the context of the affected site.
Classification
Writeup 90%
Target:
Grayscale BandSite CMS 1.1.0
No auth needed
Prerequisites:
Access to the vulnerable endpoint
exploitdb
WRITEUP
VERIFIED
by HACKERS PAL · textwebappsphp
https://www.exploit-db.com/exploits/28623
The provided text describes a reflected XSS vulnerability in Grayscale BandSite CMS version 1.1.0, where user-supplied input via the 'the_band' parameter in 'bio_content.php' is not properly sanitized, allowing arbitrary script execution in the context of the affected site.
Classification
Writeup 90%
Target:
Grayscale BandSite CMS 1.1.0
No auth needed
Prerequisites:
Access to the vulnerable URL parameter
exploitdb
WRITEUP
VERIFIED
by HACKERS PAL · textwebappsphp
https://www.exploit-db.com/exploits/28626
The provided text describes a cross-site scripting (XSS) vulnerability in Grayscale BandSite CMS version 1.1.0. It includes a proof-of-concept URL demonstrating the vulnerability but lacks executable exploit code.
Classification
Writeup 90%
Target:
Grayscale BandSite CMS 1.1.0
No auth needed
Prerequisites:
Access to the vulnerable web application
exploitdb
WRITEUP
VERIFIED
by HACKERS PAL · textwebappsphp
https://www.exploit-db.com/exploits/28627
The provided text describes a reflected XSS vulnerability in Grayscale BandSite CMS version 1.1.0, where user-supplied input in the 'the_band' parameter is not properly sanitized. The example demonstrates a basic XSS payload that executes arbitrary JavaScript in the context of the affected site.
Classification
Writeup 90%
Target:
Grayscale BandSite CMS 1.1.0
No auth needed
Prerequisites:
Access to the vulnerable endpoint
exploitdb
WRITEUP
VERIFIED
by HACKERS PAL · textwebappsphp
https://www.exploit-db.com/exploits/28629
The provided text describes a reflected XSS vulnerability in Grayscale BandSite CMS version 1.1.0, where user-supplied input in the 'the_band' parameter is not properly sanitized, allowing arbitrary script execution in the context of the affected site.
Classification
Writeup 90%
Target:
Grayscale BandSite CMS 1.1.0
No auth needed
Prerequisites:
Access to the vulnerable URL parameter