<------------------ header data start ------------------- >
#############################################################
# Application Name : inoutscripts
# Vulnerable Type : Cross-Site Scripting
# Bug Fix Advice : Harmful characters can be filtered out.
# Vendor Homepage : http://www.inoutscripts.com/
# Author : Cyber Warrior | CH2 Group | Pentester
# Author Contact : http://www.cyber-warrior.org/Forum/pop_up_profile.asp?profile=211591
# Tested on Demo Site : http://www.inoutscripts.com/support/index.php?page=
#############################################################
< ------------------- header data end of ------------------- >
< -- bug code start -- >
<marquee onmouseout="this.start();" onmouseover="this.stop();"> Bug Researchers </marquee>
< -- bug code end of -- >