With potential DOM XSS findings from Burp Plugins, we end up reading complex JavaScript codes. At the end of the day, majority of DOM XSS come from location/href objects appended with # hag.
This little script takes a list of URLs (which you can copy from Burp) and make a unique list and open your default browser every 15 seconds interval or interval of your choice.

Popular posts from this blog

OxWall 1.1.1 <= Multiple Cross Site Scripting Vulnerabilities (CVE-2012-0872)

Open-Realty CMS 3.x | Persistent Cross Site Scripting (XSS) Vulnerability

Jcow CMS 4.x:4.2 <= , 5.x:5.2 <= | Arbitrary Code Execution