Full Disclosure mailing list archives
Re: XSS on NIC Chile
From: "Zerial." <fernando () zerial org>
Date: Wed, 20 Apr 2011 14:01:18 -0300
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 STATUS is now FIXED :-) Very nice time of response from nic.cl developers. On 04/20/11 12:36, Zerial. wrote:
* Main URI: http://www.nic.cl * Type: Cross Site Scripting * Exploitable URI: http://www.nic.cl/cgi-bin/show-form?f=/example/201001191941%3Cbody%20onload=alert%28this%29%3E3a6 * Status: *Reported* * Date: April 20, 2011, 12:27 p.m. Reported on: http://www.secureless.org/vulnerability/1347/
- -- Zerial Seguridad Informatica GNU/Linux User #382319 Blog: http://blog.zerial.org Jabber: zerial () jabberes org -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.11 (GNU/Linux) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/ iEYEARECAAYFAk2vEV4ACgkQIP17Kywx9JTTyQCbB2NaW4Cgqc7dphBkEf9yR+aa 5L0AmwSpxYcqwuCVRF+kuBECnZ/FaPSG =H6DJ -----END PGP SIGNATURE----- _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Current thread:
- XSS on NIC Chile Zerial. (Apr 20)
- Re: XSS on NIC Chile Zerial. (Apr 20)
- Re: XSS on NIC Chile ksha (Apr 21)
- Multiple XSS+XSRF found at Movistar Chile ksha (Apr 26)