[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: [Full-disclosure] XSS on NIC Chile
- To: full-disclosure@xxxxxxxxxxxxxxxxx
- Subject: Re: [Full-disclosure] XSS on NIC Chile
- From: "Zerial." <fernando@xxxxxxxxxx>
- Date: Wed, 20 Apr 2011 14:01:18 -0300
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
STATUS is now FIXED :-)
Very nice time of response from nic.cl developers.
On 04/20/11 12:36, Zerial. wrote:
> * Main URI: http://www.nic.cl
>
> * Type: Cross Site Scripting
>
> * Exploitable URI:
> http://www.nic.cl/cgi-bin/show-form?f=/example/201001191941%3Cbody%20onload=alert%28this%29%3E3a6
>
> * Status: *Reported*
>
> * Date: April 20, 2011, 12:27 p.m.
>
> Reported on: http://www.secureless.org/vulnerability/1347/
>
>
>
>
- --
Zerial
Seguridad Informatica
GNU/Linux User #382319
Blog: http://blog.zerial.org
Jabber: zerial@xxxxxxxxxxxx
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/
iEYEARECAAYFAk2vEV4ACgkQIP17Kywx9JTTyQCbB2NaW4Cgqc7dphBkEf9yR+aa
5L0AmwSpxYcqwuCVRF+kuBECnZ/FaPSG
=H6DJ
-----END PGP SIGNATURE-----
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/