get.html 1.0 KB

12345678910111213141516171819202122232425262728293031323334353637
  1. <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
  2. <html>
  3. <head><title>XSS HTTP Inject0r!</title>
  4. <meta http-equiv="content-type" content="text/html;charset=utf-8">
  5. <link rel="shortcut icon" href="../images/favicon.ico" type="image/x-icon">
  6. <style type="text/css">
  7. <!--
  8. body,td,th {
  9. color: #FFFFFF;
  10. }
  11. body {
  12. background-color: #000000;
  13. }
  14. -->
  15. </style><title>Simple XSS HTTP GET vulnerability</title>
  16. <body>
  17. <form action="search.php" method="get">
  18. <p align="center"><strong>Simple HTTP GET XSS vulnerability</strong></p>
  19. <div align="center">
  20. <table width="270" border="0">
  21. <tr>
  22. <td width="106"><strong>Search:</strong></td>
  23. <td width="154"><input name="search_text" type="text" id="search_text" /></td>
  24. </tr>
  25. </table>
  26. <table width="268" border="0">
  27. <tr>
  28. <td width="262"><div align="center">
  29. <input name="submit" type="submit" value="Search it!" />
  30. </div></td>
  31. </tr>
  32. </table>
  33. </div>
  34. </form>
  35. </body>
  36. </html>