Cross Site Scripting (Reflected) on https://www.acronis.cz/dotaznik/roadshow-2020/
Low
Vulnerability Details
You can post javascript code in form fields
## Summary
[add summary of the vulnerability]
## Steps To Reproduce
[add details for how we can reproduce the issue]
steps :
1-go to vulnerability link : https://www.acronis.cz/dotaznik/roadshow-2020/
2- enter this javascript code "><script>alert(1);</script> in form field
1. [add step]
1. [add step]
1. [add step]
## Recommendations
[add details for how to fix or at least mitigate the issue]
## Impact
If an attacker can control a script that is executed in the victim's browser
Actions
View on HackerOneReport Stats
- Report ID: 1081747
- State: Closed
- Substate: resolved
- Upvotes: 15