source: https://www.securityfocus.com/bid/55561/info IFOBS is prone to multiple HTML-injection vulnerabilities. Exploiting these issues may allow an attacker to execute HTML and script code in the context of the affected site, to steal cookie-based authentication credentials, or to control how the site is rendered to the user; other attacks are also possible. IFOBS XSS-1.html IFOBS XSS exploit (C) 2012 MustLive. http://websecurity.com.ua
IFOBS XSS-2.html IFOBS XSS exploit (C) 2012 MustLive. http://websecurity.com.ua
IFOBS XSS-3.html IFOBS XSS exploit (C) 2012 MustLive. http://websecurity.com.ua
IFOBS XSS-4.html IFOBS XSS exploit (C) 2012 MustLive. http://websecurity.com.ua
IFOBS XSS-5.html IFOBS XSS exploit (C) 2012 MustLive. http://websecurity.com.ua