Loading HuntDB...

Cross Site Scripting (Reflected) on https://www.acronis.cz/dotaznik/roadshow-2020/

Low
A
Acronis
Submitted None
Reported by darkdream

Vulnerability Details

Technical details and impact analysis

Cross-site Scripting (XSS) - Reflected
You can post javascript code in form fields ## Summary [add summary of the vulnerability] ## Steps To Reproduce [add details for how we can reproduce the issue] steps : 1-go to vulnerability link : https://www.acronis.cz/dotaznik/roadshow-2020/ 2- enter this javascript code "><script>alert(1);</script> in form field 1. [add step] 1. [add step] 1. [add step] ## Recommendations [add details for how to fix or at least mitigate the issue] ## Impact If an attacker can control a script that is executed in the victim's browser

Report Details

Additional information and metadata

State

Closed

Substate

Resolved

Bounty

$50.00

Submitted

Weakness

Cross-site Scripting (XSS) - Reflected