source: https://www.securityfocus.com/bid/55561/info
IFOBS is prone to multiple HTML-injection vulnerabilities.
Exploiting these issues may allow an attacker to execute HTML and script code in the context of the affected site, to steal cookie-based authentication credentials, or to control how the site is rendered to the user; other attacks are also possible.
IFOBS XSS-1.html
IFOBS XSS exploit (C) 2012 MustLive. http://websecurity.com.ua IFOBS XSS-2.html IFOBS XSS exploit (C) 2012 MustLive. http://websecurity.com.ua IFOBS XSS-3.html IFOBS XSS exploit (C) 2012 MustLive. http://websecurity.com.ua IFOBS XSS-4.html IFOBS XSS exploit (C) 2012 MustLive. http://websecurity.com.ua IFOBS XSS-5.html IFOBS XSS exploit (C) 2012 MustLive. http://websecurity.com.ua