Script http-xssed
Script types:
portrule
Categories:
safe, external, discovery
Download: https://svn.nmap.org/nmap/scripts/http-xssed.nse
Script Summary
This script searches the xssed.com database and outputs the result.
See also:
Script Arguments
- slaxml.debug
See the documentation for the slaxml library.
- http.host, http.max-body-size, http.max-cache-size, http.max-pipeline, http.pipeline, http.truncated-ok, http.useragent
See the documentation for the http library.
- smbdomain, smbhash, smbnoguest, smbpassword, smbtype, smbusername
See the documentation for the smbauth library.
Example Usage
nmap -p80 --script http-xssed.nse <target> This script will search the xssed.com database and it will output any results. xssed.com is the largest online archive of XSS vulnerable websites. PORT STATE SERVICE REASON 80/tcp open http syn-ack | http-xssed: | xssed.com found the following previously reported XSS vulnerabilities marked as unfixed: | | /redirect/links.aspx?page=http://xssed.com | | /derefer.php?url=http://xssed.com/ | | xssed.com found the following previously reported XSS vulnerabilities marked as fixed: | |_ /myBook/myregion.php?targetUrl=javascript:alert(1);
Requires
Author:
License: Same as Nmap--See https://nmap.org/book/man-legal.html