This site uses cookies. In order to read how we handle cookies please click here. Click on this message to accept and hide.
Go to top still vulnerable to XSS

Vulnerable page:

PoC[login]="><img src=>[login]="><script>alert(document.cookie)</script>

You can either include any XSS code in login input box, or request any XSS code directly using GET method and user[login] parameter. Same goes for email input box, or user[email].

Image tag
Script tag

Note: This is a proof of concept and it doesn't reflect the views or interests of above websites.
Posted by RoLex on 2013-11-25 21:56 0 likes


There are no comments for this news article, you can leave one here.