[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <4DAF115E.5000204@zerial.org>
Date: Wed, 20 Apr 2011 14:01:18 -0300
From: "Zerial." <fernando@...ial.org>
To: full-disclosure@...ts.grok.org.uk
Subject: Re: XSS on NIC Chile
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
STATUS is now FIXED :-)
Very nice time of response from nic.cl developers.
On 04/20/11 12:36, Zerial. wrote:
> * Main URI: http://www.nic.cl
>
> * Type: Cross Site Scripting
>
> * Exploitable URI:
> http://www.nic.cl/cgi-bin/show-form?f=/example/201001191941%3Cbody%20onload=alert%28this%29%3E3a6
>
> * Status: *Reported*
>
> * Date: April 20, 2011, 12:27 p.m.
>
> Reported on: http://www.secureless.org/vulnerability/1347/
>
>
>
>
- --
Zerial
Seguridad Informatica
GNU/Linux User #382319
Blog: http://blog.zerial.org
Jabber: zerial@...beres.org
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/
iEYEARECAAYFAk2vEV4ACgkQIP17Kywx9JTTyQCbB2NaW4Cgqc7dphBkEf9yR+aa
5L0AmwSpxYcqwuCVRF+kuBECnZ/FaPSG
=H6DJ
-----END PGP SIGNATURE-----
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists